Layered Botnet Detection Framework Based On Signal Processing And Discrete Time Analysis

A massive volume of online financial transactions and sensitive information is exchanged over the Internet. This has shifted the focus of cyber attackers from curiosity to financial gain. Attackers use different malware to achieve their goals. Among the various forms of malware; the botnet is...

Full description

Bibliographic Details
Main Author: Melhim, Loai Kayed Hassan Bani
Format: Thesis
Language:English
Published: 2012
Subjects:
Online Access:http://eprints.usm.my/45258/1/Loai%20Kayed%20Hassan%20Bani%20Melhim24.pdf
_version_ 1797011342637400064
author Melhim, Loai Kayed Hassan Bani
author_facet Melhim, Loai Kayed Hassan Bani
author_sort Melhim, Loai Kayed Hassan Bani
collection USM
description A massive volume of online financial transactions and sensitive information is exchanged over the Internet. This has shifted the focus of cyber attackers from curiosity to financial gain. Attackers use different malware to achieve their goals. Among the various forms of malware; the botnet is considered as the worst, because of its vast computing power, ability to control many machines and its significant threat to the Internet users. This thesis presents a new approach in the area of botnet detection. It introduces a framework called Layered Botnet Detection Framework (LBDF) that can detect botnet members efficiently. This framework works in the frequency domain rather than in the time domain. LBDF is equipped with a ‘malicious-scanning’ detection algorithm. The LBDF algorithm uses SYN, ACK (SNAK) rules to reduce the volume of network captured traffic and to convert the reduced traffic into discrete time sequences. Then LBDF applies both a periodogram and circular autocorrelation function to these sequences to detect any hidden periodicities. If periodic behavior were detected, the frequency of the sequence and the IP address of the monitored computer will be recorded. Thus the IP address of PCs with periodic behavior will be saved in a database and labeled as suspicious. If any of the suspicious machines performs a malicious-scanning action, it will be declared as a bot. Bots that have similar features are grouped together as members of the same botnet.
first_indexed 2024-03-06T15:32:56Z
format Thesis
id usm.eprints-45258
institution Universiti Sains Malaysia
language English
last_indexed 2024-03-06T15:32:56Z
publishDate 2012
record_format dspace
spelling usm.eprints-452582019-08-22T08:24:09Z http://eprints.usm.my/45258/ Layered Botnet Detection Framework Based On Signal Processing And Discrete Time Analysis Melhim, Loai Kayed Hassan Bani QA75.5-76.95 Electronic computers. Computer science A massive volume of online financial transactions and sensitive information is exchanged over the Internet. This has shifted the focus of cyber attackers from curiosity to financial gain. Attackers use different malware to achieve their goals. Among the various forms of malware; the botnet is considered as the worst, because of its vast computing power, ability to control many machines and its significant threat to the Internet users. This thesis presents a new approach in the area of botnet detection. It introduces a framework called Layered Botnet Detection Framework (LBDF) that can detect botnet members efficiently. This framework works in the frequency domain rather than in the time domain. LBDF is equipped with a ‘malicious-scanning’ detection algorithm. The LBDF algorithm uses SYN, ACK (SNAK) rules to reduce the volume of network captured traffic and to convert the reduced traffic into discrete time sequences. Then LBDF applies both a periodogram and circular autocorrelation function to these sequences to detect any hidden periodicities. If periodic behavior were detected, the frequency of the sequence and the IP address of the monitored computer will be recorded. Thus the IP address of PCs with periodic behavior will be saved in a database and labeled as suspicious. If any of the suspicious machines performs a malicious-scanning action, it will be declared as a bot. Bots that have similar features are grouped together as members of the same botnet. 2012-09 Thesis NonPeerReviewed application/pdf en http://eprints.usm.my/45258/1/Loai%20Kayed%20Hassan%20Bani%20Melhim24.pdf Melhim, Loai Kayed Hassan Bani (2012) Layered Botnet Detection Framework Based On Signal Processing And Discrete Time Analysis. PhD thesis, Universiti Sains Malaysia.
spellingShingle QA75.5-76.95 Electronic computers. Computer science
Melhim, Loai Kayed Hassan Bani
Layered Botnet Detection Framework Based On Signal Processing And Discrete Time Analysis
title Layered Botnet Detection Framework Based On Signal Processing And Discrete Time Analysis
title_full Layered Botnet Detection Framework Based On Signal Processing And Discrete Time Analysis
title_fullStr Layered Botnet Detection Framework Based On Signal Processing And Discrete Time Analysis
title_full_unstemmed Layered Botnet Detection Framework Based On Signal Processing And Discrete Time Analysis
title_short Layered Botnet Detection Framework Based On Signal Processing And Discrete Time Analysis
title_sort layered botnet detection framework based on signal processing and discrete time analysis
topic QA75.5-76.95 Electronic computers. Computer science
url http://eprints.usm.my/45258/1/Loai%20Kayed%20Hassan%20Bani%20Melhim24.pdf
work_keys_str_mv AT melhimloaikayedhassanbani layeredbotnetdetectionframeworkbasedonsignalprocessinganddiscretetimeanalysis