Detection of Peer-to-Peer Botnet Using Machine Learning Techniques and Ensemble Learning Algorithm

Detection of Peer-to-Peer Botnet Using Machine Learning Techniques and Ensemble Learning Algorithm

Sangita Baruah, Dhruba Jyoti Borah, Vaskar Deka
Copyright: © 2023 |Pages: 16
DOI: 10.4018/IJISP.319303
Article PDF Download
Open access articles are freely available for download

Abstract

Peer-to-peer (P2P) botnet is one of the greatest threats to digital data. It has become a common tool for performing a lot of malicious activities such as DDoS attacks, phishing attacks, spreading spam, identity theft, ransomware, extortion attack, and many other fraudulent activities. P2P botnets are very resilient and stealthy and keep mutating to evade security mechanisms. Therefore, it has become necessary to identify and detect botnet flow from the normal flow. This paper uses supervised machine learning algorithms to detect P2P botnet flow. This paper also uses an ensemble learning technique to combine the performances of various supervised machine learning models to make predictions. To validate the results, four performance metrics have been used. These are accuracy, precision, recall, and F1-score. Experimental results show that the proposed approach delivers 99.99% accuracy, 99.81% precision, 99.11% recall, and 99.32% F1 score, which outperform the previous botnet detection approaches.
Article Preview
Top

1. Introduction

Botnet is a sophisticated piece of malware that poses serious security risks to computing resources. It is actually a network of compromised computers that are remotely controlled by an attacker known as a botmaster through a command-and-control (C&C) server. The C&C server is the main backbone of the network because the botmaster instructs or communicates with the compromised computers, also known as bots, via this C&C server. The botmaster uses a network of these bots to carry out various malicious activities, causing mainly financial losses to several organisations around the world. WannaCry (Shinan et al., 2021) is a ransomware attack that was launched using a botnet in 150 countries in 2017 and resulted a loss of £6 billion worldwide. This attack affected 200,000 computers around the world. ZeuS was another well-known botnet (Atluri & Tran, 2017; Balaban, 2022), which spanned 196 countries and infected over 13 million computers. It is a member of the credentials-stealing trojan family and has caused a loss of more than $120 million. An earlier version of ZeuS was a centralised IRC botnet. Later, an improved P2P variant known as Gameover ZeuS was introduced.

Based on the C&C communication, there are two types of architecture (Miller & Busby-Earle, 2016) of botnets:

  • Centralised Architecture

  • Decentralised Architecture

Centralised botnets have a designated C&C server. The botmaster uses this C&C server as a central hub to communicate to all bots under its control. One of the main advantages of this architecture is that it provides reliable control and coordination between the botmaster and bots; and also makes monitoring easy for the botmaster. However, it has a vulnerability of a single point of failure. Once the C&C server is detected, it can be blocked. The botmaster will not be able to communicate to other bots as the C&C server is blocked and the entire botnet will collapse. There are two types of botnets that follow centralised architecture. These are:

  • IRC-based botnets

  • HTTP-based botnets

Some examples of IRC-based botnets are: Spybot, Agobot, GT bot, etc. Some examples of HTTP-based botnets are: Bobax, ClickBot, Rustock, Blackenergy, etc.

To avoid single point failure vulnerability, decentralised botnets are more frequently used by the botmaster. Botnets that follow decentralised architecture are known as P2P botnets.

A decentralised P2P botnet does not have a designated C&C server. The botmaster can choose any node of the network to act as a C&C server for any moment of time. Thus, bots can behave as a server as well as a client. As C&C is distributed, decentralised botnets are very hard to detect. This category of botnet uses P2P protocol for its communications; hence it is difficult to distinguish normal traffic from bot traffic. P2P botnets are very resilient and robust. Some examples of P2P botnets are: Gameover ZeuS, Mirai, Nsis, FritzFrog, etc.

Recently, many researchers have proposed various methodologies to mitigate the detection and identification of botnets. According to Obeidat (2016), botnet detection techniques can be categorised as follows:

  • Anomaly-based detection

  • Signature-based detection

  • Honeypot-based detection

  • Node-based detection

  • Community-based detection

  • Structure or protocol-based detection

  • Machine learning algorithm-based detection

  • Data mining algorithm-based detection

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing