A. Kiayias, Justin Neumann, D. Walluck, Owen McCusker
{"title":"基于融合和数据挖掘的僵尸网络检测框架","authors":"A. Kiayias, Justin Neumann, D. Walluck, Owen McCusker","doi":"10.1109/CATCH.2009.9","DOIUrl":null,"url":null,"abstract":"This paper describes a combined fusion and miningframework applied to the detection of stealthy botnets.The framework leverages a fusion engine thattracks hosts through the use of feature-based profilesgenerated from multiple network sensor types. Theseprofiles are classified and correlated based on a setof known host profiles, e.g., web servers, mail servers,and bot behavioral characteristics. A mining enginediscovers emergent threat profiles and delivers themto the fusion engine for processing. We describe thedistributed nature of botnets and how they are createdand managed. We then describe a combined fusion andmining model that builds on recent work in the cybersecurity domain. The framework we present employsan adaptive fusion system driven by a mining systemfocused on the discovery of new threats. We concludewith a discussion of experimental results, deploymentissues, and a summary of our arguments.","PeriodicalId":130933,"journal":{"name":"2009 Cybersecurity Applications & Technology Conference for Homeland Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"A Combined Fusion and Data Mining Framework for the Detection of Botnets\",\"authors\":\"A. Kiayias, Justin Neumann, D. Walluck, Owen McCusker\",\"doi\":\"10.1109/CATCH.2009.9\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper describes a combined fusion and miningframework applied to the detection of stealthy botnets.The framework leverages a fusion engine thattracks hosts through the use of feature-based profilesgenerated from multiple network sensor types. Theseprofiles are classified and correlated based on a setof known host profiles, e.g., web servers, mail servers,and bot behavioral characteristics. A mining enginediscovers emergent threat profiles and delivers themto the fusion engine for processing. We describe thedistributed nature of botnets and how they are createdand managed. We then describe a combined fusion andmining model that builds on recent work in the cybersecurity domain. The framework we present employsan adaptive fusion system driven by a mining systemfocused on the discovery of new threats. We concludewith a discussion of experimental results, deploymentissues, and a summary of our arguments.\",\"PeriodicalId\":130933,\"journal\":{\"name\":\"2009 Cybersecurity Applications & Technology Conference for Homeland Security\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-03-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Cybersecurity Applications & Technology Conference for Homeland Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CATCH.2009.9\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Cybersecurity Applications & Technology Conference for Homeland Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CATCH.2009.9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Combined Fusion and Data Mining Framework for the Detection of Botnets
This paper describes a combined fusion and miningframework applied to the detection of stealthy botnets.The framework leverages a fusion engine thattracks hosts through the use of feature-based profilesgenerated from multiple network sensor types. Theseprofiles are classified and correlated based on a setof known host profiles, e.g., web servers, mail servers,and bot behavioral characteristics. A mining enginediscovers emergent threat profiles and delivers themto the fusion engine for processing. We describe thedistributed nature of botnets and how they are createdand managed. We then describe a combined fusion andmining model that builds on recent work in the cybersecurity domain. The framework we present employsan adaptive fusion system driven by a mining systemfocused on the discovery of new threats. We concludewith a discussion of experimental results, deploymentissues, and a summary of our arguments.