Home // IMMM 2013, The Third International Conference on Advances in Information Mining and Management // View article
Detecting Command and Control Channels of a Botnet Using a N-packet-based Approach
Authors:
Félix Brezo
José Gaviria de la Puerta
Pablo G. Bringas
Keywords: botnet detection; n-packets; supervised learning; traffic analysis
Abstract:
The botnet phenomenon is one of the major threats in nowadays cyberspace. The ability of malware writers to code profitable applications with a softened learning curve is forcing public and private organisms to take measures against these infections. In this paper, we propose a method to identify traffic belonging to the Command & Control channels from a botnet. Our method takes into account the attributes of the packets captured from a connection to build vectorial representations of the connection by appending them into sequences of packets. Thus, we provide an empirical study of how these representations can be used to detect such a communicative behaviour by considering the issue as a supervised classification problem and comparing the results obtained by more than 20 machine learning algorithms.
Pages: 24 to 31
Copyright: Copyright (c) IARIA, 2013
Publication date: November 17, 2013
Published in: conference
ISSN: 2326-9332
ISBN: 978-1-61208-311-7
Location: Lisbon, Portugal
Dates: from November 17, 2013 to November 21, 2013