Detection of Botnet Command and Control Traffic by the Multistage Trust Evaluation of Destination Identifiers

Authors

  • Pieter Burghouwt Delft University of Technology
  • Marcel E.M. Spruit The Hague University of Applied Sciences

DOI:

https://doi.org/10.4108/eai.5-10-2015.150476

Keywords:

Botnets, Network Intrusion Detection, Anomaly Detection

Abstract

Network-based detection of botnet Command and Control communication is a difficult task if the traffic has a relatively low volume and if popular protocols, such as HTTP, are used to resemble normal traffic. We present a new network-based detection approach that is capable of detecting this type of Command and Control traffic in an enterprise network by estimating the trustworthiness of the traffic destinations. If the destination identifier of a traffic flow origins directly from: human input, prior traffic from a trusted destination, or a defined set of legitimate applications, the destination is trusted and its associated traffic is classified as normal. Advantages of this approach are: the ability of zero day malicious traffic detection, low exposure to malware by passive host-external traffic monitoring, and the applicability for real-time filtering. Experimental evaluation demonstrates successful detection of diverse types of Command and Control Traffic.

Downloads

Published

05-10-2015

How to Cite

1.
Burghouwt P, E.M. Spruit M. Detection of Botnet Command and Control Traffic by the Multistage Trust Evaluation of Destination Identifiers. EAI Endorsed Trans Sec Saf [Internet]. 2015 Oct. 5 [cited 2025 Nov. 4];2(4):e2. Available from: https://publications.eai.eu/index.php/sesa/article/view/549