DocumentCode
630461
Title
Botnet detection: A cooperative game theoretical correlation-based model
Author
Al Ebri, Noura ; Otrok, Hadi ; Mourad, Alain ; Al-Hammadi, Yousof
Author_Institution
Dept. of Electr. & Comput. Eng., Khalifa Univ. of Sci., Technol. & Res., Abu Dhabi, United Arab Emirates
fYear
2013
fDate
19-21 June 2013
Firstpage
28
Lastpage
32
Abstract
In this paper, we address the problem of botnet detection by correlating information from trusted hosts and network. Botnets are groups of compromised computers controlled by a botmaster through a command and control (C&C) channel. They are noted as one of the foremost security threat causing large scale attacks such as Distributed Denial of Service (DDoS), Spam, mass identity theft and click fraud. Various approaches are used to detect botnets and they range from network to host level detection. To enhance the detection rate, a correlation based model was proposed that combines both host and network level information. Such a model is valid in a network made of trusted hosts. The emergence of smartphones with the capability of mobility and being hosts in different networks, open the door of having untrusted hosts that can reveal fake information. As a solution, we propose a trust-based model that uses cooperative game theory to cluster trusted hosts. The trust is built using the reputation value and it is computed using the hosts´ marginal contribution which is derived from Shapley value. Simulation results show that our model improves the detection score compared to the traditional correlation model. Where in one of the simulated scenarios we are able to detect a benign cluster of hosts faster than the traditional correlation model.
Keywords
command and control systems; correlation methods; game theory; invasive software; smart phones; unsolicited e-mail; DDoS; Shapley value; botnet detection; click fraud; command and control channel; cooperative game theoretical correlation based model; distributed denial of service; host level detection; mass identity theft; smartphones; spam; trusted hosts; Computational modeling; Correlation; Data models; Game theory; Games; Ports (Computers); Security; Botnet; botnet detection system; cooperative game theory; correlation; game theory;
fLanguage
English
Publisher
ieee
Conference_Titel
Communications and Information Technology (ICCIT), 2013 Third International Conference on
Conference_Location
Beirut
Print_ISBN
978-1-4673-5306-9
Type
conf
DOI
10.1109/ICCITechnology.2013.6579517
Filename
6579517
Link To Document