Detecting IRC-based Botnets by Network Traffic Analysis Through Machine Learning

Xue Jun Li, M. Ma, Yi Lin Yen
{"title":"Detecting IRC-based Botnets by Network Traffic Analysis Through Machine Learning","authors":"Xue Jun Li, M. Ma, Yi Lin Yen","doi":"10.1109/ITNAC46935.2019.9077964","DOIUrl":null,"url":null,"abstract":"Cybersecurity becomes increasingly important as information and communications technology (ICT) is adopted throughout the world. Cyber attacks can happen both externally and internally. With majority of cyber attacks being executed by insiders, it is important to detect insider attacks and even prevent them. This paper studies how to apply machine learning in analyzing network traffic to detect insider attacks, particularly in the area of botnet detection. Different from existing work considered two types of Hyper Text Transfer Protocol (HTTP)-based botnets, we consider two types of popular Internet Relay Chat (IRC)-based botnets. With selected flow characteristics, experimental results show that the proposed detection model can achieve a true positive rate of over 96%, with a false positive rate of less than 5%.","PeriodicalId":407514,"journal":{"name":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","volume":"464 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 29th International Telecommunication Networks and Applications Conference (ITNAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITNAC46935.2019.9077964","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Cybersecurity becomes increasingly important as information and communications technology (ICT) is adopted throughout the world. Cyber attacks can happen both externally and internally. With majority of cyber attacks being executed by insiders, it is important to detect insider attacks and even prevent them. This paper studies how to apply machine learning in analyzing network traffic to detect insider attacks, particularly in the area of botnet detection. Different from existing work considered two types of Hyper Text Transfer Protocol (HTTP)-based botnets, we consider two types of popular Internet Relay Chat (IRC)-based botnets. With selected flow characteristics, experimental results show that the proposed detection model can achieve a true positive rate of over 96%, with a false positive rate of less than 5%.
基于机器学习的网络流量分析检测基于irc的僵尸网络
随着信息通信技术(ICT)在世界范围内的普及,网络安全变得越来越重要。网络攻击既可以发生在外部,也可以发生在内部。由于大多数网络攻击是由内部人员实施的,因此检测甚至预防内部攻击非常重要。本文主要研究了如何将机器学习应用于网络流量分析来检测内部攻击,特别是在僵尸网络检测领域。与现有研究中考虑的两种基于超文本传输协议(HTTP)的僵尸网络不同,我们考虑了两种流行的基于Internet中继聊天(IRC)的僵尸网络。实验结果表明,在所选择的流量特性下,所提出的检测模型的真阳性率达到96%以上,假阳性率小于5%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信