Proceedings of the 1st International Workshop on Agents and CyberSecurity 2014
DOI: 10.1145/2602945.2602949
|View full text |Cite
|
Sign up to set email alerts
|

Identifying and modeling botnet C&C behaviors

Abstract: Through the analysis of a long-term botnet capture, we identified and modeled the behaviors of its C&C channels. They were found and characterized by periodicity analyses and statistical representations. The relationships found between the behaviors of the UDP, TCP and HTTP C&C channels allowed us to unify them in a general model of the botnet behavior. Our behavioral analysis of the C&C channels gives a new perspective on the modeling of malware behavior, helping to better understand botnets.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 11 publications
0
11
0
Order By: Relevance
“…Their work is concerned in the time-based behavioral characteristics. In article [8] the identification of the User Datagram Protocol (UDP), Transmission Control Protocol (TCP) and HTTP C&C channels and its analysis is presented. The second article [9], from which we were inspired, provides a comprehensive view of the comparison of the ways and possibilities to botnet detection.…”
Section: Related Workmentioning
confidence: 99%
“…Their work is concerned in the time-based behavioral characteristics. In article [8] the identification of the User Datagram Protocol (UDP), Transmission Control Protocol (TCP) and HTTP C&C channels and its analysis is presented. The second article [9], from which we were inspired, provides a comprehensive view of the comparison of the ways and possibilities to botnet detection.…”
Section: Related Workmentioning
confidence: 99%
“…When the server receives the request, it replies with a HTTP Response packet like in figure 2 that includes Message Body. Analyzing several HTTP packets from different software, for instance web browsers and chatting software tools that are usually installed in computers by endusers, reveal some worthwhile information for detecting botnets network traffic packets and flows [25].…”
Section: A Http Protocolmentioning
confidence: 99%
“…The reason behind this structure is that even in the highly controlled networks HTTP protocol is allowed to be used. Another famous botnet that uses HTTP protocol as the main carrier protocol is Zeus [25]. The Zeus bot has been developed to steal banking credentials and other personal data.As illustrated in figure 8, the bot initiates its HTTP transaction by using POST method to communicate with C&C server.…”
Section: B Http Characteristics In Botnetsmentioning
confidence: 99%
“…Furthermore, dynamic ports and runtime protocol changes enable botnets to bypass signature-based firewalls and intrusion detection systems (IDS). For robust detection systems, several flow-based botnet detection approaches [7], [8], [9], [10] were recently proposed, working without packet payload information. Differently than flow-based detection, other recently proposed botnet detection approaches consist in characterizing and analyzing relationships between hosts in the network, with techniques commonly referred to as graph-based anomaly detection [11], [12], [13].…”
Section: Introductionmentioning
confidence: 99%