Generating content-based signatures for detecting bot-infected machines
buir.advisor | Selçuk, Ali Aydın | |
dc.contributor.author | Bilge, Leyla | |
dc.date.accessioned | 2016-01-08T18:06:35Z | |
dc.date.available | 2016-01-08T18:06:35Z | |
dc.date.issued | 2008 | |
dc.description | Ankara : The Department of Computer Engineering and the Institute of Engineering and Science of Bilkent University, 2008. | en_US |
dc.description | Thesis (Master's) -- Bilkent University, 2008. | en_US |
dc.description | Includes bibliographical references leaves 76-79. | en_US |
dc.description.abstract | A botnet is a network of compromised machines that are remotely controlled and commanded by an attacker, who is often called the botmaster. Such botnets are often abused as platforms to launch distributed denial of service attacks, send spam mails or perform identity theft. In recent years, the basic motivations for malicious activity have shifted from script kiddie vandalism in the hacker community, to more organized attacks and intrusions for financial gain. This shift explains the reason for the rise of botnets that have capabilities to perform more sophisticated malicious activities. Recently, researchers have tried to develop botnet detection mechanisms. The botnet detection mechanisms proposed to date have serious limitations, since they either can handle only certain types of botnets or focus on only specific botnet attributes, such as the spreading mechanism, the attack mechanism, etc., in order to constitute their detection models. We present a system that monitors network traffic to identify bot-infected hosts. Our goal is to develop a more general detection model that identifies single infected machines without relying on the bot propagation vector. To this end, we leverage the insight that all of the bots get a command and perform an action as a response, since the command and response behavior is the unique characteristic that distinguishes the bots from other malware. Thus, we examine the network traffic generated by bots to locate command and response behaviors. Afterwards, we generate signatures from the similar commands that are followed by similar bot responses without any explicit knowledge about the command and control protocol. The signatures are deployed to an IDS that monitors the network traffic of a university. Finally, the experiments showed that our system is capable of detecting bot-infected machines with a low false positive rate. | en_US |
dc.description.provenance | Made available in DSpace on 2016-01-08T18:06:35Z (GMT). No. of bitstreams: 1 0003596.pdf: 572673 bytes, checksum: 14b961239329694005fa706b564d72c7 (MD5) | en |
dc.description.statementofresponsibility | Bilge, Leyla | en_US |
dc.format.extent | xii, 81 leaves, illustrations, graphs | en_US |
dc.identifier.itemid | BILKUTUPB109214 | |
dc.identifier.uri | http://hdl.handle.net/11693/14735 | |
dc.language.iso | English | en_US |
dc.rights | info:eu-repo/semantics/openAccess | en_US |
dc.subject | Botnet | en_US |
dc.subject | Botmaster | en_US |
dc.subject | Malware | en_US |
dc.subject.lcc | TK5105.59 .B55 2008 | en_US |
dc.subject.lcsh | Computer networks--Security measures. | en_US |
dc.subject.lcsh | Web sites--Security measures. | en_US |
dc.subject.lcsh | Computer security. | en_US |
dc.subject.lcsh | Computer hackers. | en_US |
dc.title | Generating content-based signatures for detecting bot-infected machines | en_US |
dc.type | Thesis | en_US |
thesis.degree.discipline | Computer Engineering | |
thesis.degree.grantor | Bilkent University | |
thesis.degree.level | Master's | |
thesis.degree.name | MS (Master of Science) |
Files
Original bundle
1 - 1 of 1