2009
DOI: 10.1007/978-3-642-04342-0_17
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Temporal Persistence to Detect Covert Botnet Channels

Abstract: Abstract. We describe a method to detect botnet command and control traffic and individual end-hosts. We introduce the notion of "destination traffic atoms" which aggregate the destinations and services that are communicated with. We then compute the "persistence", which is a measure of temporal regularity and that we propose in this paper, for individual destination atoms. Very persistent destination atoms are added to a host's whitelist during a training period. Subsequently, we track the persistence of new … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
52
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 69 publications
(57 citation statements)
references
References 4 publications
0
52
0
Order By: Relevance
“…We verified that this is essentially the same botnet as the aforementioned botnet, as they both contacted the same IRC server 220.196.X.226, The bot observed in June contacted port 3938 while the later bot contacted the server 9 We know that it is the same botnet because the binaries use the same C&C channel. 10 At first glance, this looks like a BASE64 encoded string.…”
Section: Bot Binaries With Cleartext Communicationmentioning
confidence: 59%
See 1 more Smart Citation
“…We verified that this is essentially the same botnet as the aforementioned botnet, as they both contacted the same IRC server 220.196.X.226, The bot observed in June contacted port 3938 while the later bot contacted the server 9 We know that it is the same botnet because the binaries use the same C&C channel. 10 At first glance, this looks like a BASE64 encoded string.…”
Section: Bot Binaries With Cleartext Communicationmentioning
confidence: 59%
“…In our honeynet, we have observed at least two other commands issued by the same botnet (with different bot binaries). 9 The changes in commands reflected relocation of binary hosting websites and file names. Apparently, the original hosting site (media.pixpond.com) was no longer available, so the botmaster switched to two other websites (imgplace.com and img2.freeimagehosting.net).…”
Section: Bot Binaries With Cleartext Communicationmentioning
confidence: 99%
“…Inspired by the persistency concept [16], the authors Fedynyshyn, et al [17] proposed a solution to use the persistency to detect C&C channels and classify them to their architecture (IRC, HTTP or P2P) by monitoring individual host's traffic. Garasia,et al [18] applied the Apriori association algorithm [19] to identify the presence of a C&C channel for HTTP botnets, by applying four main phases named traffic representation, filtering, separation and detection.…”
Section: Related Workmentioning
confidence: 99%
“…Giroire et al propose detection of botnet C&C traffic by identifying new repeated combinations of traffic destinations within varying time windows [26]. This type of anomaly detection assumes C&C traffic that connects multiple times to the same destination.…”
Section: Related Workmentioning
confidence: 99%