簡易檢索 / 詳目顯示

研究生: 葉佳祥
Jia-Siang Ye
論文名稱: SCAP : 基於分析混合流量特徵偵測P2P 殭屍網路
SCAP : A P2P Botnet Detection System by Analyzing Composite Traffic Characteristic
指導教授: 李漢銘
Hahn-Ming Lee
口試委員: 鄭欣明
none
鄭博仁
none
林豐澤
none
學位類別: 碩士
Master
系所名稱: 電資學院 - 資訊工程系
Department of Computer Science and Information Engineering
論文出版年: 2016
畢業學年度: 104
語文別: 英文
論文頁數: 70
中文關鍵詞: P2P殭屍網路偵測機器學習
外文關鍵詞: P2P殭屍網路, 偵測, 機器學習
相關次數: 點閱:198下載:4
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報

過去十年來,P2P殭屍網路成為現在網路環境的威脅之一。
攻擊者散佈惡意程式控制受害者主機,並利用受害者主機為踏板進行攻擊。
隨著偵測機制的提出,現在的殭屍網路有更多的行為來規避偵測,而基於會話的殭屍網路偵測便在這時提出,基於會話的偵測機制可讓部分規避行為無效化。相對低,會有跟其他P2P流量混合在一起的可能。
本文提出一個新的資料型態來定義"會話",並針對新的資料型態找出特徵,並提出改良後的演算法進行分類,新的演算法名稱為Spatial Clustering of Applications without Parameter”。
最後,當特徵無法判別是否為殭屍網路時,會根據封包大小之間的關係,導入機率的形式做出判斷,結合特徵跟關係,讓我們的系統可以從混合流量中偵測P2P 殭屍網路 。


During the last two decades, P2P botnets have severe security threat to the contemporary information networks. Usually attackers first distribute malware to control the victim’s host and then use the host as a springboard to launch attack on the specific targets.
Because the botnets become smarter than ever to avoid security detection,many researches on both centralized and decentralized botnets regarding security detection have been reported. Among them, some researchers focused on the conversation-based detection. However, the problem of composite traffic occurs frequently in these researches. In our study, we do not use ”conversation” to detect botnet but use ”payload conversation”. With the characteristic of ”payload conversation”, our system can tackle with the composite traffic problems. We then propose a new algorithm called ”Spatial Clustering of Applications without Parameter” (SCAP) to classify the traffic problems. SCAP is a nonparametric algorithm which is an improved version of K-means. SCAP can automatically cluster training data without setting any parameters. With this advantage, our system can deal with the traffic problemsin different P2P applications.

1 Introduction 1.1 Movitation 1.2 Challenge 1.3 Goals 1.4 Contribution 2 Background 2.1 Botnet Life-Cycle 2.2 Botnet Architecture 2.2.1 Centralized C&C 2.2.2 Decentralized C&C 2.3 Parasite Botnet 2.4 Related Work 2.4.1 Detection technology 2.4.2 Conversation-based detection 2.5 Summary 3 Apporach 3.1 Payload Conversation-Based P2P Botnet Detection System 3.2 Payload Conversation Collector 3.2.1 Traffic Filter 3.2.2 Payload Conversation Estimator 3.3 Payload Conversation-Based Featurs Engine 3.3.1 Connection-Failed Identifing 3.4 P2P Botnet Detection Engine 3.5 Payload Relationship Collector Engine 3.5.1 Relations Founder Engine 3.5.2 Relations Predictor Engine 4 Experiment 4.1 Datasets 4.2 Evaluation Methods 4.3 Experiment Results 4.4 Experiment discussion 4.5 Limitations 5 Conclusion and FutureWork 5.1 Conclusion 5.2 Future Work

[1] A. Nappa, A. Fattori, M. Balduzzi, M. DellAmico, L. Cavallaro, “Take a deep
breath: a stealthy, resilient and cost-effective botnet using skype,” in in: Proceedings
of the 7th International Conference on Detection of Intrusions and Malware,
and Vulnerability Assessment, DIMVA10,, 2010.
[2] A. Shahrestani, M. Feily, R. Ahmad, S. Ramadass, “Architecture for applying
data mining and visualization on network flow for botnet traffic detection,” in in:
International Conference on Computer Technology and Development, ICCTD 09,
vol. 1, 2009.
[3] B. AsSadhan, J. Moura, D. Lapsley, C. Jones, W. Strayer, “Detecting botnets
using command and control traffic,” in in: Eighth IEEE International Symposium
on Network Computing and Applications,, 2009.
[4] B Rahbarinia, R Perdisci, A Lanzi, K Li, “Peerrush: mining for unwanted p2p
traffic,” in in Detection of Intrusions and Malware, and Vulnerability Assessment
(Springer Berlin, Heidelberg, 2013), 2013.
[5] D. Liu, Y. Li, Y. Hu, Z. Liang, “A p2p-botnet detection model and algorithms
based on network streams analysis,” in IEEE Computer Society, Changzhou,
China,, 2010.
[6] D. Zhang, C. Zheng, H. Zhang, H. Yu, “Identification and analysis of skype peerto-
peer traffic,” in in: Fifth International Conference on Internet and Web Applications
and Services (ICIW), 2010.
[7] David Dagon , Niels Provos , Christopher P. Lee ,Wenke Lee, “Corrupted dns resolution
paths: The rise of a malicious resolution authority,” in Proc. 15th Network
and Distributed System Security Symposium (NDSS), Internet Society,, 2008.
[8] DECKER, A., SANCHO, D., KHAROUNI, L., GONCHAROV,
M., AND MCARDLE, R., “A study of the pushdo / cutwail botnet.”; 2009:
[9] E. Cooke, F. Jahanian, D. McPherson, “The zombie roundup: understanding,
detecting, and disrupting botnets,” in in: Proceedings of the Steps to Reducing
Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the
Internet Workshop, USENIX Association, Berkeley, CA, USA,, 2005.
[10] E. Stinson, J.C Mitchell, “Characterizing bots remote control behavior,” in in:
Proceedings of the 4th International Conference on Detection of Intrusions and
Malware, and Vulnerability Assessment, DIMVA07, 2007.
[11] Elaheh Biglar Beigi, Hossein Hadian Jazi, Natalia Stakhanova and Ali A. Ghorbani
, “Towards effective feature selection in machine learning-based botnet detection
approaches,” in in:Communications and Network Security (CNS), 2014
IEEE Conference on, 2014.
[12] Ester, Martin; Kriegel, Hans-Peter; Sander, Jrg; Xu, Xiaowei, “A density-based algorithm for discovering clusters in large spatial databases with noise,” in Proceedings
of the Second International Conference on Knowledge Discovery and
Data Mining (KDD-96), 1996.
[13] F. Chen, S. Ranjan, P. Tan, “Detecting bots via incremental ls-svm learning with
dynamic feature adaptation,” in in: Proceedings of the 17th ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining, KDD 11,, 2011.
[14] F. Sanchez, Z. Duan, Y. Dong,“Blocking spam by separating end-user machines
from legitimate mail server machines,” in in: Proceedings of the 8th Annual Collaboration,
Electronic messaging, Anti-Abuse and Spam Conference, CEAS 11,
ACM,, 2011.
[15] G. Gu, R. Perdisci, J. Zhang, W. Lee, “Botminer: clustering analysis of network
traffic for protocol-and structure-independent botnet detection,” in in: Proceedings
of the 17th Conference on Security Symposium, 2008.
[16] G. Gu, V. Yegneswaran, P. Porras, J. Stoll, W. Lee, “Active botnet probing to
identify obscure command and control channels,” in in: Computer Security Applications
Conference, ACSAC09, 2009.
[17] G. Gu, P. Porras, V. Yegneswaran, M. Fong, W. Lee, “Bothunter: detecting malware
infection through ids-driven dialog correlation,,” in in: Proceedings of 16th
USENIX Security Symposium on USENIX Security Symposium, USENIX Association,,
2007.
[18] H Hang, X Wei,M Faloutsos, T Eliassi-Rad, “Entelecheia: detecting p2p botnets in their waiting stage,” in in IFIP Networking Conference, 2013 (IEEE USA,2013),, 2013.
[19] H.R. Zeidanloo, M.J. Shooshtari, P.V. Amoli, M. Safari, M. Zamani, “A taxonomy
of botnet detection techniques,” in in: 3rd IEEE International Conference
on Computer Science and Information Technology (ICCSIT), vol. 2,, 2010.
[20] Z.Huang, “Extensions to the k-means algorithm for clustering large data sets with
categorical values,” in Data Mining Knowl. Discov., vol. 2, 1998.
[21] J. Goebel, T. Holz, “Rishi: identify bot contaminated hosts by irc nickname evaluation,”
in in: Proceedings of the first conference on First Workshop on Hot
Topics in Understanding Botnets, 2007.
[22] J. Liu, Y. Xiao, K. Ghaboosi, H. Deng, J. Zhang, “Botnet: classification, attacks,
detection, tracing, and preventive measures,,” in EURASIP Journal of Wireless
Communication Networks 2009, 2009.
[23] J. Zhang, R. Perdisci,W. Lee, U. Sarfraz, X. Luo, “Detecting stealthy p2p botnets
using statistical traffic fingerprints,” in in: DNS 2011, IEEE Computer Society,
Los Alamitos, 2011.
[24] J Zhang, R Perdisci, W Lee, X Luo, U Sarfraz, “Building a scalable system for
stealthy p2p-botnet detection,” in inIEEE Transactions on Information Forensics
and Security 9(1), January 2014.
[25] J.B Grizzard, V. Sharma, C. Nunnery, B.B Kang, D. Dagon, “Peer-topeer botnets:
overview and case study,” in in: Proceedings of the First Conference on First
Workshop on Hot Topics in Understanding Botnets, 2007.
[26] J.R Binkley, S. Singh, “An algorithm for anomaly-based botnet detectio,” in Proceedings
of the 2nd Conference on Steps to Reducing Unwanted Traffic on the
Internet, vol. 2, 2006.
[27] C.Kalt, “Rfc 2810-internet relay chat: architecture,” 2000, ¡http://
tools.ietf.org/html/rfc2810¿.
[28] L Li, S Mathur, B Coskun, “Gangs of the internet: towards automatic discovery of
peer-to-peer communities,” in in Communications and Network Security (CNS),,
2013.
[29] L. Liu, S. Chen, G. Yan, Z. Zhang, “Bottracer: Execution-based bot-like malware
detection,” in in: T. Wu, C. Lei, V. Rijmen, D. Lee (Eds.), Information Security,
Lecture Notes in Computer Science, vol. 5222, 2008.
[30] M. Feily, A. Shahrestani, S. Ramadass, “A survey of botnet and botnet detection,”
in in: Emerging Security Information, Systems andTechnologies, 2009.
[31] M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, G.Varghese,
“Network monitoring using traffic dispersion graphs (tdgs),” in in: Proceedings
of the 7th ACM SIGCOMM Conference on Internet Measurement, IMC 07,ACM,,
2007.
[32] M. Jelasity, V. Bilicki, “Towards automated detection of peer-to-peer botnets: on
the limits of local approaches,” in in: USENIX Workshop on Large-Scale Exploits
and Emergent Threats (LEET09), 2009.
[33] T.Micro, “Taxonomy of botnet threats,” Trend Micro White Paper,, Tech. Rep.,
2006.
[34] M.P Collins, M.K Reiter, “Hit-list worm detection and bot identification in large
networks using protocol graphs,” in in: Proceedings of the 10th International
Conference on Recent Advances in Intrusion Detection, RAID07, 2007.
[35] P.Narang, “Peershark: flow-clustering and conversation-generation for malicious
peer-to-peer traffic identification,” in EURASIP Journal on Information Security,
2014.
[36] R. Ng and J. Han, “Clarans: A method for clustering objects for spatial data
mining,” in IEEE Trans. Knowl. Data Eng., vol. 14, no. 5, 2002.
[37] O. Thonnard, M. Dacier, “A strategic analysis of spam botnets operations,” in in:
Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse
and Spam Conference, CEAS11, 2011.
[38] P. Bacher, T. Holz, M. Kotter, G. Wicherski, “Know your enemy: Tracking botnets
(using honeynets to learn more about bots),,” in Technical Report, The Honeynet
Project,, 2008.
[39] P. Maymounkov, D. Mazieres, “Kademlia: a peer-to-peer information system
based on the xor metric,” in in: Revised Papers from the First International Workshop
on Peer-to-Peer Systems, 2002.
[40] P Narang, JM Reddy, C Hota, “Feature selection for detection of peer-to-peer
botnet traffic,” in in Proceedings of the 6th ACM India Computing Convention
(Compute 13) (ACM New York, NY, USA, 2013),, 2013.
[41] P. Salvador, A. Nogueira, U. Franca, R. Valadas, “Framework for zombie detection using neural networks,” in in: Fourth International Conference on Internet
Monitoring and Protection, ICIMP09, 2009.
[42] P. Wang, S. Sparks, C.C Zou, “An advanced hybrid peer-to-peer botnet,” in in:
Proceedings of the first conference on First Workshop on Hot Topics in Understanding
Botnets, 2007.
[43] P. Wurzinger, L. Bilge, T. Holz, J. Goebel, C. Kruegel, E. Kirda, “Automatically
generating models for botnet detection,” in in: M. Backes, P. Ning (Eds.), Computer
Security ESORICS 2009, Lecture Notes in Computer Science, vol. 5789,
2009.
[44] Pratik Narang, Subhajit Ray, Chittaranjan Hota, “Peershark: Detecting peer-topeer
botnets by tracking conversations,” in in IEEE Security and Privacy Workshops,
2014.
[45] N. Provos, “A virtual honeypot framework,,” in Proceedings of the 13th Conference
on USENIX Security Symposium SSYM04,vol. 13,, 2004.
[46] R Schoof, R Koning, “Detecting peer-to-peer botnets,” University of Amsterdam,
Tech. Rep., 2007.
[47] Rafael A. Rodrguez-Gmez , Gabriel Maci-Fernndez , Pedro Garca-Teodoro ,
Moritz Steiner , Davide Balzarotti, “Resource monitoring for the detection of
parasite p2p botnets,” Computer Networks: The International Journal of Computer
and Telecommunications Networking, 2014.
[48] RAFAEL A. RODRIGUEZ-GO MEZ, GABRIEL MACIA -FERNANDEZ
and PEDRO GARCIA-TEODORO, “Survey and taxonomy of botnet research through life-cycle,” in Published in:ACM Computing Surveys (CSUR),Volume 45
Issue 4, August 2013 Article No. 45, 2013.
[49] Rui Xu, Student Member, IEEE and Donald Wunsch II, Fellow, IEEE, “Survey
of clustering algorithms,” in IEEE Transactions on Neural Networks (Volume:16
, Issue: 3 ), 2005.
[50] S. Basudev, A. Gairola, “Botnet: An overview,” in CERT-In White Paper CIWP-
2005-05, 2005.
[51] S. Guha, R. Rastogi, and K. Shim, “Cure: An efficient clustering algorithm for
large databases,” in in Proc. ACM SIGMOD Int. Conf. Management of Data,
1998.
[52] S. Huang, C. Mao, H. Lee, “Fast-flux service network detection based on spatial
snapshot mechanism for delay-free detection,” in in: Proceedings of the 5th ACM
Symposium on Information, Computer and Communications Security, ASIACCS
10, ACM,, 2010.
[53] S. Stover, D. Dittrich, J. Hernandez, S. Dietrich, “Analysis of the storm and nugache:
P2p is here,” in in: Proceedings of the 4th USENIX Workshop on Cyber
Security Experimentation and Test(CSET11), 2007.
[54] Sndor Molnr,Marcell Pernyi “On the identification and analysis of skype traffic,”
in INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J.
Commun. Syst, 2011.
[55] Snort, “Snort 2.9.0,” in ¡http://www.snort.org¿.
[56] Y.Song, “Detecting p2p botnet by analyzing macroscopic characteristics with
fractal and information fusion,” in inWireless Communication over ZigBee for
Automotive Inclination Measurement. China Communications 12,, 2015.
[57] T Karagiannis, K Papagiannaki, M Faloutsos, “Blinc: multilevel traffic classification
in the dark,” in in SIGCOMM Comput. Commun. Rev., vol. 35, 2005.
[58] T Karagiannis, A Broido, M Faloutsos, K Claffy, “Transport layer identification
of p2p traffic,” in in Proceedings of the 4th ACM SIGCOMM Conference on Internet
Measurement (IMC 04) (ACM New York, NY, USA, 2004), 2004.
[59] T. Zhang, R. Ramakrishnan, and M. Livny, “Birch: An efficient data clustering
method for very large databases,” in in Proc. ACM SIGMOD Conf. Management
of Data, 1996.
[60] W. Lu, M. Tavallaee, G. Rammidi, A. Ghorbani, “Botcop: an online botnet traffic
classifier,,” in in: Seventh Annual Communication Networks and Services Research
Conference,CNSR09,, 2009.
[61] Y. Kugisaki, Y. Kasahara, Y. Hori, K. Sakurai, “Bot detection based on traffic
analysis,” in in: The 2007 International Conference on Intelligent Pervasive
Computing, 2007.
[62] Yong Qiao, Yuexiang Yang, Jie He, Bo Liu, Yingzhi Zeng, “Detecting parasite
p2p botnet in emule-like networks through quasi-periodicity recognition,” inLecture
Notes in Computer Science 7259:127-139, 2012.
[63] S.Zhang, “Conversation-based p2p botnet detection with decision fusion,” in
Masters thesis, Fredericton: University of New Brunswick, 2013.
[64] X.Zhang, “Actibot: A botnet to evade active detection,” in Master’s Projects.
Paper 205. http://scholarworks.sjsu.edu/etdprojects=205; 2011:

QR CODE