2011 Conference on Network and Information Systems Security 2011
DOI: 10.1109/sar-ssi.2011.5931397
|View full text |Cite
|
Sign up to set email alerts
|

Modelling to Simulate Botnet Command and Control Protocols for the Evaluation of Network Intrusion Detection Systems

Abstract: National audienceThe purpose of this paper is the modelization and simulation of zombie machines for the evaluation of Network Intrusion Detection Systems (NIDS), used to detect botnets. We propose an automatic method to infer zombies behaviors through the analysis of messages exchanged with their masters. Once computed, a model provides a solution to generate realistic and manageable traffic, which is mandatory for an NIDS evaluation. We propose to use a Stochastic Mealy Machine to model zombies behavior, and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0
2

Year Published

2012
2012
2019
2019

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(6 citation statements)
references
References 11 publications
0
4
0
2
Order By: Relevance
“…Other applications target generating behavioral specifications of Web applications [61], the new biometric European passport [4], bot nets [12], and enterprise applications [73]. Margaria et al showed that model learning may help to increase confidence that a legacy component and a refactored implementation have the same behavior [53].…”
Section: Related Work and Applicationsmentioning
confidence: 99%
“…Other applications target generating behavioral specifications of Web applications [61], the new biometric European passport [4], bot nets [12], and enterprise applications [73]. Margaria et al showed that model learning may help to increase confidence that a legacy component and a refactored implementation have the same behavior [53].…”
Section: Related Work and Applicationsmentioning
confidence: 99%
“…In our scenario, this is the ProxyOracle Figure 8. Learned model of an e-commerce application, learned with the setup descriptor of Figure 6 (lines [4][5]. This oracle translates symbols of a special form to invocations on the proxy object.…”
Section: Usage In Learnlibmentioning
confidence: 99%
“…In recent years, automata learning has been employed to create formal models of real-life systems, such as electronic passports [1], telephony systems [5,7], web applications [14,15], communication protocol entities [3], and malicious networked agents [4]. The wide scope of application areas gives testimony on the universality of the automata learning approach.…”
Section: Introductionmentioning
confidence: 99%
“…Les messages qui déclenchent une vulnérabilité peuvent être traduits en signatures et ajoutés à un système de détection d'intrusion, par exemple. L'analyse de protocoles de malware (Bossert et al, 2011 ;Caballero et al, 2009 ;Caballero Bayerri, 2010) s'appuie sur la rétro-conception. En effet, bon nombre de malware, comme les bots, utilisent des protocoles pour communiquer avec leur serveur de Command & Control.…”
Section: Introductionunclassified