Presentation is loading. Please wait.

Presentation is loading. Please wait.

Detecting Botnets Using Hidden Markov Models on Network Traces Wade Gobel Bio-Grid, Summer 2008.

Similar presentations


Presentation on theme: "Detecting Botnets Using Hidden Markov Models on Network Traces Wade Gobel Bio-Grid, Summer 2008."— Presentation transcript:

1 Detecting Botnets Using Hidden Markov Models on Network Traces Wade Gobel Bio-Grid, Summer 2008

2 Bots and Botnets Malicious self-propagating program Difficult to detect Most antivirus software is signature-based Ability to communicate and coordinate with botmaster IRC HTTP Prevalence Honeypots Size is power

3 Bot Infection Security flaws Port scanning Compromised servers Increase range Allow for communication indirection

4 Bot Attacks & Profits “Renting out” a botnet Spam DDoS Click fraud Identity theft

5 Bot Detection Indicators Similar requests Synchronization Problems Potentially little traffic Potential delay between command and action

6 Hidden Markov Models

7 Initial State Probabilities

8 Transition Probabilities

9 Observation Probabilities

10 Complete HMM

11 Example States: Observations: Question: What’s the weather been like? Example courtesy of http://en.wikipedia.org/wiki/Hidden_Markov_model

12 Modeling with HMMs Only given observations Generate most likely HMM that generates the sequence of states The Baum-Welch algorithm

13 The Process Collect network data Extract some characteristic HMM models underlying state of computer / network Test for similarity between HMMs Synchronization may result in greater similarity

14 Sample Data Variation Regular / random intervals Same / Different number of bot-initiated requests Synchronization With / Without user browsing


Download ppt "Detecting Botnets Using Hidden Markov Models on Network Traces Wade Gobel Bio-Grid, Summer 2008."

Similar presentations


Ads by Google