Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic

14Citations
Citations of this article
61Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Botnets can simultaneously control millions of Internet-connected devices to launch damaging cyber-attacks that pose significant threats to the Internet. In a botnet, botmasters communicate with the command and control server using various communication protocols. One of the widely used communication protocols is the ‘Domain Name System’ (DNS) service, an essential Internet service. Bot-masters utilise Domain Generation Algorithms (DGA) and fast-flux techniques to avoid static blacklists and reverse engineering while remaining flexible. However, botnet’s DNS communication generates anomalous DNS traffic throughout the botnet life cycle, and such anomaly is considered an indicator of DNS-based botnets presence in the network. Despite several approaches proposed to detect botnets based on DNS traffic analysis; however, the problem still exists and is challenging due to several reasons, such as not considering significant features and rules that contribute to the detection of DNS-based botnet. Therefore, this paper examines the abnormality of DNS traffic during the botnet lifecycle to extract significant enriched features. These features are further analysed using two machine learning algorithms. The union of the output of two algorithms proposes a novel hybrid rule detection model approach. Two benchmark datasets are used to evaluate the performance of the proposed approach in terms of detection accuracy and false-positive rate. The experimental results show that the proposed approach has a 99.96% accuracy and a 1.6% falsepositive rate, outperforming other state-of-the-art DNS-based botnet detection approaches

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Al-mashhadi, S., Anbar, M., Hasbullah, I., & Alamiedy, T. A. (2021). Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic. PeerJ Computer Science, 7, 1–34. https://doi.org/10.7717/peerj-cs.640

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 12

50%

Lecturer / Post doc 7

29%

Researcher 5

21%

Readers' Discipline

Tooltip

Computer Science 19

83%

Materials Science 2

9%

Pharmacology, Toxicology and Pharmaceut... 1

4%

Social Sciences 1

4%

Save time finding and organizing research with Mendeley

Sign up for free