• DocumentCode
    1785286
  • Title

    PsyBoG: Power spectral density analysis for detecting botnet groups

  • Author

    Jonghoon Kwon ; Jeongsik Kim ; Jehyun Lee ; Heejo Lee ; Perrig, Adrian

  • Author_Institution
    Dept. of Comput. Sci. & Eng., Korea Univ., Seoul, South Korea
  • fYear
    2014
  • fDate
    28-30 Oct. 2014
  • Firstpage
    85
  • Lastpage
    92
  • Abstract
    Botnets are widely used for acquiring economic profits, by launching attacks such as distributed denial-of-service (DDoS), identification theft, ad-ware installation, mass spamming, and click frauds. Many approaches have been proposed to detect botnet, which rely on end-host installations or operate on network traffic with deep packet inspection. They have limitations for detecting botnets which use evasion techniques such as packet encryption, fast flux, dynamic DNS and DGA. Sporadic botnet behavior caused by disconnecting the power of system or botnet´s own nature also brings unignorable false detection. Furthermore, normal user´s traffic causes a lot of false alarms. In this paper, we propose a novel approach called PsyBoG to detect botnets by capturing periodic activities. PsyBoG leverages signal processing techniques, PSD (Power Spectral Density) analysis, to discover the major frequencies from the periodic DNS queries of botnets. The PSD analysis allows us to detect sophisticated botnets irrespective of their evasion techniques, sporadic behavior and even the noise traffic generated by normal users. To evaluate PsyBoG, we utilize the real-world DNS traces collected from a /16 campus network including more than 48,046K queries, 34K distinct IP addresses and 146K domains. Finally, PsyBoG caught 19 unknown and 6 known botnet groups with 0.1% false positives.
  • Keywords
    IP networks; fraud; invasive software; signal processing; spectral analysis; telecommunication traffic; DDoS; IP addresses; PSD analysis; PsyBoG; ad-ware installation; botnet group detection; click fraud; distributed denial-of-service; dynamic DGA; dynamic DNS; economic profit; end-host installation; evasion techniques; false detection; fast flux; identification theft; mass spamming; network traffic; noise traffic; packet encryption; packet inspection; periodic DNS query; periodic activity; power spectral density analysis; real-world DNS traces; signal processing technique; sophisticated botnet; sporadic behavior; sporadic botnet behavior; IP networks; Sensors; Servers; Signal processing; Testing; Time series analysis; Unsolicited electronic mail; Botnet detection; Group Activity; Power Spectral Density;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Malicious and Unwanted Software: The Americas (MALWARE), 2014 9th International Conference on
  • Conference_Location
    Fajardo, PR
  • Print_ISBN
    978-1-4799-7328-6
  • Type

    conf

  • DOI
    10.1109/MALWARE.2014.6999414
  • Filename
    6999414