Detection of Botnet Command and Control Traffic by the Multistage Trust Evaluation of Destination Identifiers

Authors

DOI:

https://doi.org/10.4108/eai.5-10-2015.150476

Keywords:

Botnets, Network Intrusion Detection, Anomaly Detection

Abstract

Network-based detection of botnet Command and Control communication is a difficult task if the traffic has a relatively low volume and if popular protocols, such as HTTP, are used to resemble normal traffic. We present a new network-based detection approach that is capable of detecting this type of Command and Control traffic in an enterprise network by estimating the trustworthiness of the traffic destinations. If the destination identifier of a traffic flow origins directly from: human input, prior traffic from a trusted destination, or a defined set of legitimate applications, the destination is trusted and its associated traffic is classified as normal. Advantages of this approach are: the ability of zero day malicious traffic detection, low exposure to malware by passive host-external traffic monitoring, and the applicability for real-time filtering. Experimental evaluation demonstrates successful detection of diverse types of Command and Control Traffic.

Downloads

Published

05-10-2015

How to Cite

Burghouwt, P. ., & E.M. Spruit, M. . (2015). Detection of Botnet Command and Control Traffic by the Multistage Trust Evaluation of Destination Identifiers. EAI Endorsed Transactions on Security and Safety, 2(4), e2. https://doi.org/10.4108/eai.5-10-2015.150476