首页 | 本学科首页   官方微博 | 高级检索  
     

基于流相似性的两阶段P2P僵尸网络检测方法
引用本文:牛伟纳,张小松,孙恩博,杨国武,赵凌园. 基于流相似性的两阶段P2P僵尸网络检测方法[J]. 电子科技大学学报(自然科学版), 2017, 46(6): 902. DOI: 10.3969/j.issn.1001-0548.2017.06.019
作者姓名:牛伟纳  张小松  孙恩博  杨国武  赵凌园
作者单位:1.电子科技大学网络空间安全研究中心 成都 611731
基金项目:国家自然科学基金61572115国家自然科学基金61502086国家自然科学基金61402080四川省重大基础研究课题2016JY0007
摘    要:僵尸网络利用诸如蠕虫、木马以及rootkit等传统恶意程序,进行分布式拒绝服务攻击、发送钓鱼链接、提供恶意服务,已经成为网络安全的主要威胁之一。由于P2P僵尸网络的典型特征是去中心化和分布式,相对于IRC、HTTP等类型的僵尸网络具有更大的检测难度。为了解决这一问题,该文提出了一个具有两阶段的流量分类方法来检测P2P僵尸网络。首先,根据知名端口、DNS查询、流计数和端口判断来过滤网络流量中的非P2P流量;其次基于数据流特征和流相似性来提取会话特征;最后使用基于决策树模型的随机森林算法来检测P2P僵尸网络。使用UNB ISCX僵尸网络数据集对该方法进行验证,实验结果表明,该两阶段检测方法比传统P2P僵尸网络检测方法具有更高的准确率。

关 键 词:僵尸网络检测   会话特征   流相似性   P2P流量识别
收稿时间:2016-06-28

Two Stage P2P Botnet Detection Method Based on Flow Similarity
Affiliation:1.Center for Cyber Security, University of Electronic Science and Technology of China Chengdu 6117312.School of Computer Science and Engineering, University of Electronic Science and Technology of China Chengdu 611731
Abstract:The botnet has been one of the most common threats to the network security since it exploits multiple malicious codes like worm, Trojans, Rootkit, etc. toperform thedenial-of-service attack, send phishing links, and provide malicious services. Peer-to-peer (P2P) botnet is more difficult to be detected compared with IRC, HTTP and other types of botnets because it has typical features of the centralization and distribution. To solve these problems, we propose an effective two-stage traffic classification method to detect P2P botnet traffic based on both non-P2P traffic filtering mechanism and machine learning techniques on conversation features. At the first stage, the non-P2P packages are filtered to reduce the amount of network traffic, according to well-known ports, DNS query, and flow counting. At the second stage, the conversation features based on data flow features and flow similarity are extracted. Finally, the P2P botnet is detected by using Random Forest based on the decision tree model. Experimental evaluations on UNB ISCX botnet dataset shows that our two-stage detection method has a higher accuracy than traditional P2P botnet detection methods.
Keywords:
点击此处可从《电子科技大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《电子科技大学学报(自然科学版)》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号