skip to main content
10.1145/1621890.1621893acmconferencesArticle/Chapter ViewAbstractPublication PagescomswareConference Proceedingsconference-collections
research-article

BotGAD: detecting botnets by capturing group activities in network traffic

Published:16 June 2009Publication History

ABSTRACT

Recent malicious attempts are intended to obtain financial benefits using a botnet which has become one of the major Internet security problems. Botnets can cause severe Internet threats such as DDoS attacks, identity theft, spamming, click fraud. In this paper, we define a group activity as an inherent property of the botnet. Based on the group activity model and metric, we develop a botnet detection mechanism, called BotGAD (Botnet Group Activity Detector). BotGAD enables to detect unknown botnets from large scale networks in real-time. Botnets frequently use DNS to rally infected hosts, launch attacks and update their codes. We implemented BotGAD using DNS traffic and showed the effectiveness by experiments on real-life network traces. BotGAD captured 20 unknown and 10 known botnets from two day campus network traces.

References

  1. P. Barford and V. Yegneswaran. An inside look at botnets, 2006. Special Workshop on Malware Detection, Advances in Information Security, Springer Verlag.Google ScholarGoogle Scholar
  2. J. R. Binkley and S. Singh. An algorithm for anomaly-based botnet detection. In The 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI '06), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. H. Choi, H. Lee, H. Lee, and H. Kim. Botnet Detection by Monitoring Group Activities in DNS Traffic. In Proceedings of IEEE Int'l Conf. Computer and Information Technology (CIT'07), Oct 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. E. Cooke, F. Jahanian, and D. McPherson. The zombie roundup: Understanding, detecting, and disturbing botnets. In The 1st Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI '05), July 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Cyber-TA. SRI Honeynet and BotHunter Malware Analysis Automatic Summary Analysis Table. http://www.cyber-ta.org/releases/malware-analysis/public/.Google ScholarGoogle Scholar
  6. D. Dagon. Botnet detection and response. In OARC Workshop, 2005, 2005.Google ScholarGoogle Scholar
  7. D. Dagon, G. Gu, C. Lee, and W. Lee. A taxonomy of botnet structures. In Proceedings of the 23 Annual Computer Security Applications Conference (ACSAC'07), Dec 2007.Google ScholarGoogle ScholarCross RefCross Ref
  8. Domaincrawler. Domain Information Services. http://www.domaincrawler.com/.Google ScholarGoogle Scholar
  9. J. Goebel and T. Holz. Rishi: Identify bot contaminated hosts by IRC nickname evaluation. In Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets (HotBots'07), Apr 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Grizzard, V. Sharma, C. Nunnery, B. Kang, and D. Dagon. Peer-to-peer botnets: Overview and case study. In Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets (HotBots'07), Apr 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. G. Gu, R. Perdisci, J. Zhang, and W. Lee. BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In Proceedings of the 17th USENIX Security Symposium (Security'08), July 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee. BotHunter: Detecting malware infection through ids-driven dialog correlation. In Proceedings of the 16th USENIX Security Symposium (Security'07), August 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. G. Gu, J. Zhang, and W. Lee. BotSniffer: Detecting botnet command and control channels in network traffic. In Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS'08), February 2008.Google ScholarGoogle Scholar
  14. S. Herona. Working the botnet: how dynamic DNS is revitalising the zombie army. Network Security, pages 9--11, Jan 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. T. Holz, C. Gorecki, K. Rieck, and F. C. Freiling. Detection and mitigation of fast-flux service networks. In Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS'08), Feb 2008.Google ScholarGoogle Scholar
  16. T. Holz, M. Steiner, F. Dahl, E. Biersacky, and F. Freiling. Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. In Proceedings of the Firts workshop on Large-scale Exploits and Emergent Threats (LEET'08), Apr 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. H. Husna, S. Phithakkitnukoon, S. Palla, and R. Dantu. Behavior analysis of spam botnets. In Proceedings of The 3rd Intl. Conf. on COMmunication System softWAre and MiddlewaRE (COMSWARE'08), Jan 2008.Google ScholarGoogle ScholarCross RefCross Ref
  18. J. Jones. Botnets: Detection and mitigation, Feb 2003. FEDCIRC.Google ScholarGoogle Scholar
  19. A. Karasaridis, B. Rexroad, and D. Hoeflin. Wide-scale botnet detection and characterization. In Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets (HotBots'07), Apr 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Korea Information Security Agency (KISA). Botnet C&C server domain list. http://www.knsp.org/sink_dns/total.uniq.dns.rr.txt.Google ScholarGoogle Scholar
  21. L. Liu, S. Chen, G. Yan, and Z. Zhang. BotTracer: Execution-based bot-like malware detection. In Proceedings of the 11th Information Security Conference (ISC 2008), Sep 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Microsoft Help and Support. http://support.microsoft.com/kb/318803.Google ScholarGoogle Scholar
  23. Nmap, Network Mapper. Free Security Scanner. http://nmap.org/.Google ScholarGoogle Scholar
  24. J. Oikarinen and D. Reed. Internet Relay Chat Protocol. RFC 1459, 1993.Google ScholarGoogle Scholar
  25. A. Ramachandran, N. Feamster, and D. Dagon. Revealing botnet membership using dnsbl counter-intelligence. In The 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI '06), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. E. Stinson and J. C. Mitchell. Towards systematic evaluation of the evadability of bot/botnet detection methods. In Proceedings of the 2nd USENIX Workshop on Offensive Technologies (WOOT'08), July 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. I. Trestian, S. Ranjan, A. Kuzmanovic, and A. Nucci. Unconstrained endpoint profiling (googling the internet). In Proceedings of the ACM SIGCOMM 2008 conference on Data communication (SIGCOMM'08), Aug 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. P. Vixie, S. Thomson, Y. Rekhter, and J. Bound. Dynamic updates in the domain name system (DNS update), 1997. http://www.faqs.org/rfcs/rfc2136.html/.Google ScholarGoogle Scholar
  29. Wikipedia. Network Access Control. http://en.wikipedia.org/wiki/Network_Access_Control.Google ScholarGoogle Scholar
  30. Y. Xie, F. Yu, K. Achan, E. Gillum, M. Goldszmidt, and T. Wobber. How dynamic are ip addresses? In Proceedings of the ACM SIGCOMM 2007 conference on Data communication (SIGCOMM'07), Aug 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. L. Zhuang, J. Dunagan, D. R. Simon, H. J. Wang, I. Osipkov, G. Hulten, and J. D. Tygar. Characterizing botnets from email spam records. In Proceedings of the Firts workshop on Large-scale Exploits and Emergent Threats (LEET'08), Apr 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. BotGAD: detecting botnets by capturing group activities in network traffic

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        COMSWARE '09: Proceedings of the Fourth International ICST Conference on COMmunication System softWAre and middlewaRE
        June 2009
        183 pages
        ISBN:9781605583532
        DOI:10.1145/1621890

        Copyright © 2009 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 16 June 2009

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader