Apriori–PrefixSpan Hybrid Approach for Automated Detection of Botnet Coordinated Attacks Masayuki Ohrui, Hiroaki Kikuchi, Tokai University Masato Terada,

Slides:



Advertisements
Similar presentations
PREFIXSPAN ALGORITHM Mining Sequential Patterns Efficiently by Prefix- Projected Pattern Growth
Advertisements

A Hierarchical Hybrid Structure for Botnet Control and Command A Hierarchical Hybrid Structure for Botnet Control and Command Zhiqi Zhang, Baochen Lu,
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
Detecting Botnets Using Hidden Markov Models on Network Traces Wade Gobel Bio-Grid, Summer 2008.
/3024/ SUN MON TUE WED THU FRI SAT JANUARY 2011 February 2011 SMTWTFS
Fast Portscan Detection Using Sequential Hypothesis Testing Authors: Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan Publication: IEEE.
11 Automatic Discovery of Botnet Communities on Large-Scale Communication Networks Wei Lu, Mahbod Tavallaee and Ali A. Ghorbani - in ACM Symposium on InformAtion,
Mining Multidimensional Sequential Patterns over Data Streams Chedy Raїssi and Marc Plantevit DaWak_2008.
Botnet behavior and detection October RONOG Silviu Sofronie – a Head of Forensics.
Jhih-sin Jheng 2009/09/01 Machine Learning and Bioinformatics Laboratory.
Automatically Generating Models for Botnet Detection Presenter: 葉倚任 Authors: Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel,
Internet Observation with ISDAS: How long does a worm perform scanning? Tomohiro Kobori , Hiroaki Kikuchi (Tokai Univ, Japan) Masato Terada (Hitachi, Ltd.,
Frequent Sequential Attack Patterns of Malware in Botnets Nur Rohman Rosyid.
The great fast food survey 2012 Get ready to record your data!
HoneyComb HoneyComb Automated IDS Signature Generation using Honeypots Prepare by LIW JIA SENG Supervisor : AP. Dr. Mohamed Othman.
Kazuya Kuwabara, Hiroaki Kikuchi, Tokai University Masato Terada and Masashi Fujiwara, Hitachi Ltd.,
Botnets Usman Jafarey Including slides from The Zombie Roundup by Cooke, Jahanian, McPherson of the University of Michigan.
Masayuki Ohrui, Hiroaki Kikuchi, Tokai University Masato Terada, Hitachi Ltd.
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
An Energy-Efficient Approach for Real-Time Tracking of Moving Objects in Multi-Level Sensor Networks Vincent S. Tseng, Eric H. C. Lu, & Kawuu W. Lin Institute.
2009/6/221 BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure- Independent Botnet Detection Reporter : Fong-Ruei, Li Machine.
PEER TO PEER BOTNET DETECTION FOR CYBER- SECURITY (DEFENSIVE OPERATION): A DATA MINING APPROACH Masud, M. M. 1, Gao, J. 2, Khan, L. 1, Han, J. 2, Thuraisingham,
5 Day Forecast Mon Tues Wed Thu Fri.
GANTT CHARTS Example Example Example Example text Tasks Example 1
Mon – 2Tue – 3Wed – 4Thu - 5Fri - 6Sat - 7Sun - 8 Mon – 9Tue – 10Wed – 11Thu - 12Fri – 13Sat – 14Sun -15 Mon – 16Tue – 17Wed – 18Thu - 19Fri – 20Sat –
Time Revision.
JANUARY FEBRUARY MARCH APRIL MAY JUNE JULY AUGUST SEPTEMBER
JANUARY FEBRUARY MARCH APRIL MAY JUNE JULY AUGUST SEPTEMBER
MON TUE WED THU
1   1.テキストの入れ替え テキストを自由に入れ替えることができます。 フチなし全面印刷がおすすめです。 印刷のポイント.
JANUARY FEBRUARY MARCH APRIL MAY JUNE JULY AUGUST SEPTEMBER
January MON TUE WED THU FRI SAT SUN
January MON TUE WED THU FRI SAT SUN
2017 Jan Sun Mon Tue Wed Thu Fri Sat
ANNUAL CALENDAR HOLIDAYS JANUARY FEBRUARY MARCH APRIL MAY JUNE
HOLIDAYS ANNUAL CALENDAR JANUARY FEBRUARY MARCH APRIL MAY JUNE
January Sun Mon Tue Wed Thu Fri Sat
January MON TUE WED THU FRI SAT SUN
January MON TUE WED THU FRI SAT SUN
Jan Sun Mon Tue Wed Thu Fri Sat
HOLIDAYS ANNUAL CALENDAR JANUARY FEBRUARY MARCH APRIL MAY JUNE
2008 Calendar.
S M T W F S M T W F
January MON TUE WED THU FRI SAT SUN
Sun Mon Tue Wed Thu Fri Sat
1 - January - Sun Mon The Wed Thu Fri Sat
2 0 X X s c h e d u l e 1 MON TUE WED THU JANUARY 20XX FRI SAT SUN MEMO.
January MON TUE WED THU FRI SAT SUN
JANUARY 1 Sun Mon Tue Wed Thu Fri Sat
Calendar
Calendar – 2010 (October, November & December)
Calendar.
January MON TUE WED THU FRI SAT SUN
JANUARY 1 Sun Mon Tue Wed Thu Fri Sat
Sun Mon Tue Wed Thu Fri Sat
1/○~1/○ weekly schedule MON TUE WED THU FRI SAT SUN MEMO
January MON TUE WED THU FRI SAT SUN
A3 1.1c To Multiply & Divide Positive & Negative Numbers
S M T W F S M T W F
2016 | 10 OCT SUN MON TUE WED THU FRI SAT
Sun Mon Tue Wed Thu Fri Sat
JANUARY 1 Sun Mon Tue Wed Thu Fri Sat
WEB PAGES: Tables Welcome Back !.
1 January 2018 Sun Mon Tue Wed Thu Fri Sat
1 January MON TUE WED THU FRI SAT SUN MEMO 2 February MON TUE WED THU FRI SAT SUN.
2008 Calendar.
S M T W F S M T W F
Pps Download Center ©
S M T W F S M T W F
1 January MON TUE WED THU FRI SAT SUN MEMO 2 February MON TUE WED THU FRI SAT SUN.
Presentation transcript:

Apriori–PrefixSpan Hybrid Approach for Automated Detection of Botnet Coordinated Attacks Masayuki Ohrui, Hiroaki Kikuchi, Tokai University Masato Terada, Hitachi, Ltd. Nur Rohman Rosyid, KMITL NBiS2011-S4: Network Security

3. Botnet2. Variants Generation of Malware 2 1. Single NBiS2011 PEPE WORM AA BB CC PE TR The Botnet Coordinated Attacks WO

Definition of Coordinated Attacks Time1st AttackC&CCoordinated AttacksUser 0:00 1:00 1:30 NBiS20113 PE 1st Attack IRC DNS Command WO TR DNS GET

Number of Downloads ( ) NBiS20114 CCC DATAset [3 years] Number of Downloads [DL/Week] Decreasing Tendency

Avg. Length of Coordinated Attacks NBiS20115 Number of Rules [Rules/Month] Number of Patterns [Patterns/Day] CCC DATAset 2009 ~ 2010 [2 years] Complication

Objectives NBiS20116 Difficulty

Previous Works  M. Ohrui, H. Kikuchi and M, Terada, “Mining Association Rules Consisting of Download Servers from Distributed Honeypot Observation”, The 13th Int’l Conf. on Network- Based Information Systems (NBiS 2010), pp ,  N. R. Rosyid, M. Ohrui, H. Kikuchi and P. Sooraksa, M. Terada, “A Discovery of Sequential Attack Patterns of Malware in Botnets”, The 2010 IEEE Int’l Conf. on Systems, Man, and Cybernetics (SMC 2010), pp , NBiS Apriori 2. PrefixSpan

 Sequence  in order Comparison of 2 Algorythms  A set of items  unordered  if X then Y NBiS Apriori 2. PrefixSpan  Given honeypot log: WO TR PE PE WO TR PEWO TR PETR WO 50 patterns (Answer) 50/50 extracts 30/50 extracts 20/50 extracts Same Time

1. Example of Apriori NBiS20119 WeekPE1PE2WORM1WORM2TROJ1TROJ2 Sun321 Mon Tue2212 Wed5321 Thu1143 Fri223 Sat31153

2. Example of PrefixSpan  Given a sequence database and minimum support threshold 2.  : 5, : 5, : 5, : 2, and : 2 NBiS201110

Pros and Cons NBiS Date AprioriPrefixSpan RuleSlotsTrueRulePtnsTrue 09/02/04 BK,TS ⇒ WO 14 TS ⇒ BK ⇒ WO 329 TS ⇒ WO ⇒ BK 7 WO ⇒ BK ⇒ TS 4 WO ⇒ TS ⇒ BK 12 … 09/02/28 BK,TS ⇒ WO 77 TS ⇒ WO ⇒ BK 514 BK,WO ⇒ TS 7 WO ⇒ TS ⇒ BK 3 Failed detection False detection Perfect detection Many Patterns

Our Idea  Hybrid detection of Apriori and PrefixSpan. NBiS BK, TR ⇒ WO PE, WO ⇒ TR TS, WO ⇒ BK …etc BK ⇒ TR ⇒ WO: 4 BK ⇒ WO ⇒ TR: 3 TR ⇒ BK ⇒ WO: 3 WO ⇒ BK ⇒ TR: 3 Dataset Step.1 Apriori Step.1 Apriori Useless Step.2 Prefix Span Step.2 Prefix Span Useless The Botnet Coordinated Attacks The Botnet Coordinated Attacks YES NO TR ⇒ WO ⇒ BK: 10 WO ⇒ TR ⇒ BK: 12 Detected.

Experiment Experiment NBiS201113

CCC DATAset  CCC DATAset have observed malware traffic at the Japanese tier-1 backbone under the Cyber Clean Center (CCC).  The malware downloading logs  112(2008), 94(2009), 92(2010) honeypot  3 years ( November 01, April 30, 2010 )  The captured packets data  1 honeypot  2(2008), 2(2009), 7(2010) days NBiS201114

Evaluation NBiS Recall Precision B. True rules A. Detected rulesC A B C. Correctly detected rules 40 rules 50 rules 30 rules

Accuracy NBiS2011  We can deduce from the data that hybrid approach is effective. AprioriPrefixSpanHybrid Recall315/315 =1.0482/575 = /575 = 0.95 Precision315/464 = /482 =

Conclusions  We have proposed the hybrid Approach of Apriori and PrefixSpan for automated detection of botnet coordinated attacks.  Our experiment shows that the proposed scheme improves accuracy of detection by recall of 0.95 and precision of 1.0. NBiS201117

Thank you! NBiS201118