Sonification of Network Traffic for Detecting and Learning About Botnet Behavior
Today's computer networks are under increasing threat from malicious activity. Botnets (networks of remotely controlled computers, or “bots”) operate in such a way that their activity superficially resembles normal network traffic which makes their behavior hard to detect...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8385098/ |
id |
doaj-1e58c4fcbe7e4be6ad35dd1072800322 |
---|---|
record_format |
Article |
spelling |
doaj-1e58c4fcbe7e4be6ad35dd10728003222021-03-29T21:07:55ZengIEEEIEEE Access2169-35362018-01-016338263383910.1109/ACCESS.2018.28473498385098Sonification of Network Traffic for Detecting and Learning About Botnet BehaviorMohamed Debashi0Paul Vickers1https://orcid.org/0000-0003-0963-5005Department of Computer and Information Sciences, Northumbria University, Newcastle upon Tyne, U.K.Department of Computer and Information Sciences, Northumbria University, Newcastle upon Tyne, U.K.Today's computer networks are under increasing threat from malicious activity. Botnets (networks of remotely controlled computers, or “bots”) operate in such a way that their activity superficially resembles normal network traffic which makes their behavior hard to detect by current intrusion detection systems (IDS). Therefore, new monitoring techniques are needed to enable network operators to detect botnet activity quickly and in real time. Here, we show a sonification technique using the SoNSTAR system that maps characteristics of network traffic to a real-time soundscape enabling an operator to hear and detect botnet activity. A case study demonstrated how using traffic log files alongside the interactive SoNSTAR system enabled the identification of new traffic patterns characteristic of botnet behavior and subsequently the effective targeting and real-time detection of botnet activity by a human operator. An experiment using the 11.39 GiB ISOT botnet data set, containing labeled botnet traffic data, compared the SoNSTAR system with three leading machine learning-based traffic classifiers in a botnet activity detection test. SoNSTAR demonstrated greater accuracy (99.92%), precision (97.1%), and recall (99.5%) and much lower false positive rates (0.007%) than the other techniques. The knowledge generated about characteristic botnet behaviors could be used in the development of future IDSs.https://ieeexplore.ieee.org/document/8385098/Botnet detectionintrusion detection systemsnetwork monitoringsituational awarenesssonification |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Mohamed Debashi Paul Vickers |
spellingShingle |
Mohamed Debashi Paul Vickers Sonification of Network Traffic for Detecting and Learning About Botnet Behavior IEEE Access Botnet detection intrusion detection systems network monitoring situational awareness sonification |
author_facet |
Mohamed Debashi Paul Vickers |
author_sort |
Mohamed Debashi |
title |
Sonification of Network Traffic for Detecting and Learning About Botnet Behavior |
title_short |
Sonification of Network Traffic for Detecting and Learning About Botnet Behavior |
title_full |
Sonification of Network Traffic for Detecting and Learning About Botnet Behavior |
title_fullStr |
Sonification of Network Traffic for Detecting and Learning About Botnet Behavior |
title_full_unstemmed |
Sonification of Network Traffic for Detecting and Learning About Botnet Behavior |
title_sort |
sonification of network traffic for detecting and learning about botnet behavior |
publisher |
IEEE |
series |
IEEE Access |
issn |
2169-3536 |
publishDate |
2018-01-01 |
description |
Today's computer networks are under increasing threat from malicious activity. Botnets (networks of remotely controlled computers, or “bots”) operate in such a way that their activity superficially resembles normal network traffic which makes their behavior hard to detect by current intrusion detection systems (IDS). Therefore, new monitoring techniques are needed to enable network operators to detect botnet activity quickly and in real time. Here, we show a sonification technique using the SoNSTAR system that maps characteristics of network traffic to a real-time soundscape enabling an operator to hear and detect botnet activity. A case study demonstrated how using traffic log files alongside the interactive SoNSTAR system enabled the identification of new traffic patterns characteristic of botnet behavior and subsequently the effective targeting and real-time detection of botnet activity by a human operator. An experiment using the 11.39 GiB ISOT botnet data set, containing labeled botnet traffic data, compared the SoNSTAR system with three leading machine learning-based traffic classifiers in a botnet activity detection test. SoNSTAR demonstrated greater accuracy (99.92%), precision (97.1%), and recall (99.5%) and much lower false positive rates (0.007%) than the other techniques. The knowledge generated about characteristic botnet behaviors could be used in the development of future IDSs. |
topic |
Botnet detection intrusion detection systems network monitoring situational awareness sonification |
url |
https://ieeexplore.ieee.org/document/8385098/ |
work_keys_str_mv |
AT mohameddebashi sonificationofnetworktrafficfordetectingandlearningaboutbotnetbehavior AT paulvickers sonificationofnetworktrafficfordetectingandlearningaboutbotnetbehavior |
_version_ |
1724193481816014848 |