Symptoms-based detection of bot processes

  • Authors:
  • Jose Andre Morales;Erhan Kartaltepe;Shouhuai Xu;Ravi Sandhu

  • Affiliations:
  • Institute for Cyber Security, University of Texas at San Antonio;Institute for Cyber Security, University of Texas at San Antonio;Institute for Cyber Security, University of Texas at San Antonio and Department of Computer Science, University of Texas at San Antonio;Institute for Cyber Security, University of Texas at San Antonio

  • Venue:
  • MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Botnets have become the most powerful tool for attackers to victimize countless users across cyberspace. Previous work on botnet detection has mainly focused on identifying infected bot computers or IP addresses and not on identifying bot processes on a host machine. This paper aims to fill this gap by presenting a bot process detection technique based on process symptoms such as: TCP connection attempts, DNS activities, digital signatures, unauthorized process tampering, and process hiding. We partition symptoms into sets which are input into classifiers generating individual detection models which are later appropriately integrated so as to improve the detection accuracy. The integrated approach correctly identified two bot processes and did not produced any false positives and false negatives.