Presenting a peer-to-peer (P2P) botnet detection method based on cluster similarity

Number of pages: 61 File Format: word File Code: 30460
Year: 2014 University Degree: Master's degree Category: Computer Engineering
  • Part of the Content
  • Contents & Resources
  • Summary of Presenting a peer-to-peer (P2P) botnet detection method based on cluster similarity

    Dissertation for Master's degree (M.S.c)

    Field: Computers            Tension: Software

    Abstract

    Today, the use of botnets as a tool for large-scale criminal activities in computer networks against large targets such as a country has greatly increased. Bot is a distributed environment that is used for various attacks with a large volume. For this reason, the detection of this type of attacks has been raised as one of the important issues in the security of computer networks and Internet users. With the advancement of network bandwidth and the computing power of machines, distributed computing is widely used today. In this regard, hackers also use this concept to carry out more powerful attacks. Botnets are a practical example of this type of attacks that usually pursue financial goals. These types of malware are called bots or bots for short. This name originates from their automatic behavior. In this research, the term botnet and botnet detection techniques, including the interpretation of packets from data sets, primary data filtering and clustering, are examined.

    Key words: botnet, network security, internet security, clustering, computer networks

    Chapter 1

    Definitions and generalities

    1-1-    Introduction

    With the expansion of virtual spaces and the development of vast networks, the topic of security [1] and protection of important information and programs has always been desired by senior IT managers. Network security [2] and information security [3] are two terms that are used a lot in the field of information technology.  With the development and expansion of the Internet and virtual space in the web environment, information has increased rapidly and the access of users has also increased. Therefore, paying attention to network security is one of the modern necessities of continuous environments and virtual space. Network security protects the information of organizations and institutions against intruders and creates suitable conditions for service and professional activity. Information technology operates based on a platform of technical infrastructure, tools, software, networks, and high-speed telecommunication lines, and all of them require safe conditions to support professional activities. In addition to that, it should be specified in relation to what cases the systems and units should be protected. This point is of great importance in examining the state of information networks and technology fields, and it needs to be taken into account in planning for network security. Identifying the types of threats [4] and leading risks is another important factor that can be used in the field of protecting the environment of organizational networks in an appropriate way in order to provide the necessary preparation to deal with possible risks. Computer networks facilitate the communication process and help managers and organizational users to support assigned tasks. Therefore, ensuring the security of networks is one of the essential and important issues of organizations.

    Therefore, preventing the penetration of malicious agents into the network will become a strategic issue, and failure to do so will cause damages that will sometimes be irreparable, and the many advantages of the network will not be achieved well, and money, electronic commerce [5], services to specific users, personal information [6], public information [7] and electronic publications [8] are all subject to manipulation [9]. and material and spiritual abuses [10] will be placed.

    Today, the use of botnets [11] as a tool for criminal activities [12] with a large scope in computer networks against large targets such as a country has increased a lot. Bot is a distributed environment [13] that is used for various attacks with a large volume, therefore today the detection of this type of attacks [14] has been raised as one of the important issues in the security of computer networks.

    In recent years, Internet malware has grown towards better organization and more profit-oriented. Today, botnets are considered as the most important threat to Internet users.

    The attackers, after taking over the vulnerable systems of the victims, install their malicious software [15] that can be controlled remotely [16] on those systems, and then they can use these victims to carry out various Internet attacks [17] such as sending spam [18], distributed denial of service attacks [19], identity theft and other criminal activities on a very large scale, while the real identity of the attacker remains hidden. .

    The main problem with botnets is to perform these actions secretly, that is, until we specifically look for them, we will not be aware of their presence in the system, and as long as they remain in the victim's system, the victim's system will not be able to resist the non-execution of the botnet owner's commands [20]. is placed In this regard, hackers[23] also use this concept to carry out more powerful attacks.

    Botnets are a practical example of this type of attacks. A botnet is a collection of infected machines on the Internet that are remotely controlled by attackers to perform malicious [24] and illegal [25] activities.

    They are called bots [26] or abbreviated bots [27] and this name originates from their automatic behavior. Unlike worms[28] and viruses[29] that have destructive purposes[30], the purpose of using botnets by their controllers[31] is usually financial[32]. Xarvester and Rustock botnets are the strongest spammers in the world and are able to send 25,000 messages per hour, 600,000 messages per day and 4.2 million messages per week, which alone makes it necessary to investigate various botnet detection methods. .

    Also, the discussion of C&C (Command & Control) and life cycle [34] of botnet distinguishes this topic from other topics of malware.

    This thesis consists of 5 chapters, in which the definitions of the topic are introduced in the first chapter. In the second chapter, he reviewed previous studies on the topic of botnet detection. In the third chapter, the proposed method is stated and finally in the fifth chapter, the conclusion is made. Chapter Two: Review of Previous Studies 2-1 Introduction Considering that in recent years Internet malware has grown towards better organization and more profit-oriented, today botnets are the most important are considered a threat to Internet users.

    For this reason, several researches have been conducted in the field of botnet detection.

    2-2- Diagnosis criteria [35]

    Botnet detection has different criteria, which are mentioned below. disable them before participating in a cyber attack[36]. On the other hand, methods that detect botnets in the attack phase of their life cycle are more accurate. 2-3 detection levels [37] On the other hand, botnet detection methods can use two different levels of correlation analysis, including individual level [38] and group level [39]. In individual level analysis, botnet detection methods focus on identifying each host [40] infected with bot It is solitary in the network, without paying attention to the behavior of other bot-infected hosts. These methods have the advantage of being able to detect even one bot-infected host in the monitored network. Individual level analysis is usually performed by matching observed activities with known patterns [41] in the database [42]. Therefore, it requires prior knowledge[43] of botnets.

    2-4-    Group level

    In group level analysis, botnet detection methods try to identify two or more hosts that have similar behavior patterns[44] and identify them as suspicious hosts[45] for bots.

  • Contents & References of Presenting a peer-to-peer (P2P) botnet detection method based on cluster similarity

    List:

    The first chapter. 1

    Definitions and generalities. 1

    1-1-Introduction. 2

    1-2-The importance and necessity of conducting research. 5

    1-3-Aspect of novelty and innovation in research. 5

    The second chapter. 6

    Review of previous studies. 6

    2-1-Introduction. 7

    2-2-diagnosis criteria. 7

    2-3 levels of detection. 7

    2-4-group level. 8

    The third chapter. 14

    Suggested method. 14

    3-1- Proposed method. 15

    3-2- Architecture of the proposed method. 16

    3-2-1- Data collection: 18

    3-2-2- Interpreting packages 20

    3-2-3- Structured data. 21

    3-2-4- Selection of features 23

    3-2-5- Clustering. 23

    3-2-6- Detection of new hosts. 24

    3-3- Implementation and pseudo code of the proposed method. 24

    Chapter Four. 27

    Implementation. 27

    Evaluation of the proposed method. 28

    4-1- The architecture of the evaluation framework. 28

    4-2- The results of the proposed method. 30

    The fifth chapter. 51

    Conclusion. 51

    5-1- Conclusion. 52

     

     

    Source:

    [1] Ang-Ning Tan, Michael Steinbach, and Vipin Kumar. 2005. Introduction to Data Mining, (First Edition). Addison-Wesley Longman Publishing Co., Boston, MA, USA.

    [2] Choi H. and H. Lee, “Identifying Botnets by Capturing Group Activities in DNS Traffic”, Computer Networks, Vol. 56, pp. 20–33, 2012.

    [3] Christopher D. Manning, Prabhakar Raghavan, and Hinrich Schütze. 2008. Introduction to Information Retrieval. Cambridge University Press, New York, NY, USA.

    [4] Gu G., R.Perdisci, J.Zhang, and W.Lee, “BotMiner: Cluster Analysis of NetworkTraffic for Protocol- and Structure-Independent Botnet Detection”, in Proceedings of the 17th USENIX Security Symposium, San Jose, CA, USA, 2008.

    [5] Ha Duc T., Yan Guanhua, Eidenbenz, Stephan, Ngo, H.Q. "On the Effectiveness of Structural Detection and Defense Against P2P-based", IEEE dependable systems and networks conference, pp. 297-306, 2009.

    [6] Kira, Kenji and Rendell, Larry (1992). The Feature Selection Problem: Traditional Methods and a New Algorithm. AAAI-92 Proceedings.

    [7] Livadas, C., Walsh, R., Lapsley, D., Strayer, W.T., "Using Machine Learning Techniques to Identify Botnet Traffic", IEEE Internetwork Research Department BBN Technologies, proceeding 31th IEEE conference, pp. 967–974, 2006. [8] Renato Cordeiro de Amorim and Boris Mirkin. 2012. Minkowski metric, feature weighting and anomalous cluster initializing in K-Means clustering. Pattern Recognition. 45, 3 (March 2012), 1061-1075. DOI=10.1016/j.patcog.2011.08.012 http://dx.doi.org/10.1016/j.patcog.2011.08.012. [9] Shahrestani, Alireza, Feily, Maryam, Ahmad, Rodina, Ramadass, Sureswaran, "Discovery of Invariant Bot Behavior through Visual Network Monitoring System", IEEE Fourth International Conference on Emerging Security Information, Systems and Technologies, pp. 182-188, 2010.

    [10] Sherif Saad, Issa Traore, Ali A. Ghorbani, Bassam Sayed, David Zhao, Wei Lu, John Felix, Payman Hakimian, "Detecting P2P botnets through network behavior analysis and machine learning", Proceedings of 9th Annual Conference on Privacy, Security and Trust (PST2011), July 19-21, 2011. Montreal, Quebec, Canada".

    [11] Stinsonand, Elizabeth, C. Mitchell, John, "Characterizing Bots' Remote Control Behavior". Botnet detection countering the largest security threat, edited by Lee, W., Dagon, D., Springer publishing, 2008. [12] Wang K., C. Huang, S. Lin, and Y. Lin, "A fuzzy pattern-based filtering algorithm for botnet detection", Computer Networks, Vol. 55, No. 15. 3275–3286, 2011.

    [13] Xiaocong Y., D. Xiaomei, Y. Ge, Q. Yuhai, and Y. Dejun. "Data-Adaptive Clustering Analysis for Online Botnet Detection", in Proceedingd of the 3rd IEEE International Joint Conference on Computational Science and Optimization, Anhui, China, 2010.

    [14] Yahyazadeh, M. and M. Abadi,Abadi, “BotOnus: An Online Unsupervised Method for Botnet Detection”, ISeCure, Vol. 4, No. 1, pp. 51–62, 2012.

    [15]  Yu, X., Dong, X., Yu, Ge, Qin, Yuhai, Yue, D., "Data-adaptive Clustering Analysis for Online Botnet Detection", IEEE Third International Joint Conference on Computational Science and Optimization, Vol. 1, pp. 456-460, 2010.

    [16] Zeng, Y., Hu, Xin, G. Shin, K., "Detection of Botnets Using Combined Host- and Network-Level Information". IEEE/IFIP International Conference on Dependable Systems & Networks (DSN), pp. 291-300, 2010. [17] R.C. Amorim, An adaptive spell checker based on PS3M "Improving the clusters of replacement words" in: M. Kurzynski, M. Wozniak (Eds.), Computer Recognition Systems, vol. 3, Springer, Berlin/Heidelberg, 2009, pp. 519–526.

    [18] R.C. Amorim, B. Mirkin, J. Gan "A Method for Classifying Mental Tasks in the Space of EEG Transforms". Technical Report BBKS-10-01, Birkbeck University of London, London, 2010.

    [19] Y. Chen, M. Rege, M. Dong, J. Hua," Non-negative matrix factorization for semi-supervised data clustering", Knowledge Information Systems 17 (3) (2008) 355-379. [20] C.Y. Tsai, C.C. Chiu,"Developing a feature weight adjustment mechanism for a K-Means clustering algorithm", Computational Statistics and Data Analysis 52 (2008) 4658–4672. [21] J. Fan, M. Han, J. Wang, "Single point iterative weighted fuzzy C-means clustering algorithm for remote sensing image segmentation", Pattern Recognition 42 (11) (2009) 2527–2540. [22] L. Zhong, Y. Jinsha, Z. Weihua, "Fuzzy C-Mean Algorithm with Morphology Similarity Distance", in: Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery 3 (2009) 90–94.

Presenting a peer-to-peer (P2P) botnet detection method based on cluster similarity