Sonification of Network Traffic for Detecting and Learning About Botnet Behavior

Today's computer networks are under increasing threat from malicious activity. Botnets (networks of remotely controlled computers, or “bots”) operate in such a way that their activity superficially resembles normal network traffic which makes their behavior hard to detect...

Full description

Bibliographic Details
Main Authors: Mohamed Debashi, Paul Vickers
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8385098/
id doaj-1e58c4fcbe7e4be6ad35dd1072800322
record_format Article
spelling doaj-1e58c4fcbe7e4be6ad35dd10728003222021-03-29T21:07:55ZengIEEEIEEE Access2169-35362018-01-016338263383910.1109/ACCESS.2018.28473498385098Sonification of Network Traffic for Detecting and Learning About Botnet BehaviorMohamed Debashi0Paul Vickers1https://orcid.org/0000-0003-0963-5005Department of Computer and Information Sciences, Northumbria University, Newcastle upon Tyne, U.K.Department of Computer and Information Sciences, Northumbria University, Newcastle upon Tyne, U.K.Today's computer networks are under increasing threat from malicious activity. Botnets (networks of remotely controlled computers, or “bots”) operate in such a way that their activity superficially resembles normal network traffic which makes their behavior hard to detect by current intrusion detection systems (IDS). Therefore, new monitoring techniques are needed to enable network operators to detect botnet activity quickly and in real time. Here, we show a sonification technique using the SoNSTAR system that maps characteristics of network traffic to a real-time soundscape enabling an operator to hear and detect botnet activity. A case study demonstrated how using traffic log files alongside the interactive SoNSTAR system enabled the identification of new traffic patterns characteristic of botnet behavior and subsequently the effective targeting and real-time detection of botnet activity by a human operator. An experiment using the 11.39 GiB ISOT botnet data set, containing labeled botnet traffic data, compared the SoNSTAR system with three leading machine learning-based traffic classifiers in a botnet activity detection test. SoNSTAR demonstrated greater accuracy (99.92%), precision (97.1%), and recall (99.5%) and much lower false positive rates (0.007%) than the other techniques. The knowledge generated about characteristic botnet behaviors could be used in the development of future IDSs.https://ieeexplore.ieee.org/document/8385098/Botnet detectionintrusion detection systemsnetwork monitoringsituational awarenesssonification
collection DOAJ
language English
format Article
sources DOAJ
author Mohamed Debashi
Paul Vickers
spellingShingle Mohamed Debashi
Paul Vickers
Sonification of Network Traffic for Detecting and Learning About Botnet Behavior
IEEE Access
Botnet detection
intrusion detection systems
network monitoring
situational awareness
sonification
author_facet Mohamed Debashi
Paul Vickers
author_sort Mohamed Debashi
title Sonification of Network Traffic for Detecting and Learning About Botnet Behavior
title_short Sonification of Network Traffic for Detecting and Learning About Botnet Behavior
title_full Sonification of Network Traffic for Detecting and Learning About Botnet Behavior
title_fullStr Sonification of Network Traffic for Detecting and Learning About Botnet Behavior
title_full_unstemmed Sonification of Network Traffic for Detecting and Learning About Botnet Behavior
title_sort sonification of network traffic for detecting and learning about botnet behavior
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2018-01-01
description Today's computer networks are under increasing threat from malicious activity. Botnets (networks of remotely controlled computers, or “bots”) operate in such a way that their activity superficially resembles normal network traffic which makes their behavior hard to detect by current intrusion detection systems (IDS). Therefore, new monitoring techniques are needed to enable network operators to detect botnet activity quickly and in real time. Here, we show a sonification technique using the SoNSTAR system that maps characteristics of network traffic to a real-time soundscape enabling an operator to hear and detect botnet activity. A case study demonstrated how using traffic log files alongside the interactive SoNSTAR system enabled the identification of new traffic patterns characteristic of botnet behavior and subsequently the effective targeting and real-time detection of botnet activity by a human operator. An experiment using the 11.39 GiB ISOT botnet data set, containing labeled botnet traffic data, compared the SoNSTAR system with three leading machine learning-based traffic classifiers in a botnet activity detection test. SoNSTAR demonstrated greater accuracy (99.92%), precision (97.1%), and recall (99.5%) and much lower false positive rates (0.007%) than the other techniques. The knowledge generated about characteristic botnet behaviors could be used in the development of future IDSs.
topic Botnet detection
intrusion detection systems
network monitoring
situational awareness
sonification
url https://ieeexplore.ieee.org/document/8385098/
work_keys_str_mv AT mohameddebashi sonificationofnetworktrafficfordetectingandlearningaboutbotnetbehavior
AT paulvickers sonificationofnetworktrafficfordetectingandlearningaboutbotnetbehavior
_version_ 1724193481816014848