{"id":574,"date":"2022-11-28T00:22:55","date_gmt":"2022-11-28T00:22:55","guid":{"rendered":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/?p=574"},"modified":"2022-12-11T09:02:01","modified_gmt":"2022-12-11T09:02:01","slug":"botnet-detection","status":"publish","type":"post","link":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/2022\/11\/28\/botnet-detection\/","title":{"rendered":"Botnet detection"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.18.0&#8243; text_font=&#8221;|600|||||||&#8221; text_text_color=&#8221;#000000&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<p><span style=\"font-size: medium\">The objective of our research is to develop a botnet detection and identification framework using traffic identification techniques.\u00a0A botnet is a collection of computers connected to the Internet which have been compromised and are being controlled remotely by an intruder via malicious software called bots. Botnets are created for many different reasons such as conducting a distributed denial of service (DDOS), spreading spam, conducting click- fraud scams, stealing personal user information (e.g. credit card numbers, social security numbers), or taking advantage of the powerful computational resources offered by the bots to carry some distributed computing tasks.<\/span><\/p>\n<p><span style=\"font-size: medium\">There are three main approaches for network traffic identification. The first approach and most trivial one is based on port analysis. The problem with port-based identification is the high false identification rates involved and the fact that today there are thousands of network applications that do not use registered TCP\/UDP ports. The second approach is based on packets payload analysis. Payload analysis has minimum false identification rate compared to other approaches. However, two major issues limit this approach. First, it is computationally intensive and has a negative effect on the network performance. Second, it poses potentially significant threat to privacy. The third approach for traffic identification is based on detecting distinctive network traffic behaviors. Traffic behavior analysis methods do not depend on the packets payload, which means that they can work with encrypted protocols. Network traffic information can usually be easily retrieved from various network devices without affecting significantly network performance or service availability. For these reasons, we use in this work traffic behavior analysis coupled with suitable machine learning techniques to identify malicious botnet traffic.<\/span><\/p>\n<h2><span style=\"font-size: medium\">People<\/span><\/h2>\n<ul>\n<li><span style=\"font-size: medium\">Dr. Issa Traore, Coordinator<\/span><\/li>\n<li><span style=\"font-size: medium\">Mr. Bassam Sayed, Investigator<\/span><\/li>\n<li><span style=\"font-size: medium\">Mr. Marcelo Luiz Brocardo, Investigator<\/span><\/li>\n<li><span style=\"font-size: medium\">Mr. David Zhao, Investigator<\/span><\/li>\n<li><span style=\"font-size: medium\">Mr. Erik Johnson, Investigator<\/span><\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The objective of our research is to develop a botnet detection and identification framework using traffic identification techniques.\u00a0A botnet is a collection of computers connected to the Internet which have been compromised and are being controlled remotely by an intruder via malicious software called bots. Botnets are created for many different reasons such as conducting [&hellip;]<\/p>\n","protected":false},"author":17669,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<h1 id=\"PageTopHeading\">Botnet detection<\/h1>\r\nThe objective of our research is to develop a botnet detection and identification framework using traffic identification techniques.\u00a0A botnet is a collection of computers connected to the Internet which have been compromised and are being controlled remotely by an intruder via malicious software called bots. Botnets are created for many different reasons such as conducting a distributed denial of service (DDOS), spreading spam, conducting click- fraud scams, stealing personal user information (e.g. credit card numbers, social security numbers), or taking advantage of the powerful computational resources offered by the bots to carry some distributed computing tasks.\r\n\r\nThere are three main approaches for network traffic identification. The first approach and most trivial one is based on port analysis. The problem with port-based identification is the high false identification rates involved and the fact that today there are thousands of network applications that do not use registered TCP\/UDP ports. The second approach is based on packets payload analysis. Payload analysis has minimum false identification rate compared to other approaches. However, two major issues limit this approach. First, it is computationally intensive and has a negative effect on the network performance. Second, it poses potentially significant threat to privacy. The third approach for traffic identification is based on detecting distinctive network traffic behaviors. Traffic behavior analysis methods do not depend on the packets payload, which means that they can work with encrypted protocols. Network traffic information can usually be easily retrieved from various network devices without affecting significantly network performance or service availability. For these reasons, we use in this work traffic behavior analysis coupled with suitable machine learning techniques to identify malicious botnet traffic.\r\n<h2>People<\/h2>\r\n<ul>\r\n \t<li>Dr. Issa Traore, Coordinator<\/li>\r\n \t<li>Mr. Bassam Sayed, Investigator<\/li>\r\n \t<li>Mr. Marcelo Luiz Brocardo, Investigator<\/li>\r\n \t<li>Mr. David Zhao, Investigator<\/li>\r\n \t<li>Mr. Erik Johnson, Investigator<\/li>\r\n<\/ul>","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[16,14],"tags":[],"class_list":["post-574","post","type-post","status-publish","format-standard","hentry","category-past-projects","category-research"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/574","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/users\/17669"}],"replies":[{"embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/comments?post=574"}],"version-history":[{"count":5,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/574\/revisions"}],"predecessor-version":[{"id":1053,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/posts\/574\/revisions\/1053"}],"wp:attachment":[{"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/media?parent=574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/categories?post=574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/onlineacademiccommunity.uvic.ca\/isot\/wp-json\/wp\/v2\/tags?post=574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}