Sonification of Network Traffic for Detecting and Learning About Botnet Behavior

Mohamed Debashi, Paul Vickers

Research output: Contribution to journalArticlepeer-review

7 Citations (Scopus)
27 Downloads (Pure)

Abstract

Today's computer networks are under increasing threat from malicious activity. Botnets (networks of remotely controlled computers, or "bots") operate in such a way that their activity superficially resembles normal network traffic which makes their behaviour hard to detect by current Intrusion Detection Systems (IDS). Therefore, new monitoring techniques are needed to enable network operators to detect botnet activity quickly and in real time. Here we show a sonification technique using the SoNSTAR system that maps characteristics of network traffic to a real-time soundscape enabling an operator to hear and detect botnet activity. A case study demonstrated how using traffic log files alongside the interactive SoNSTAR system enabled the identification of new traffic patterns that characteristic botnet behaviour and subsequently the effective targeting and real-time detection of botnet activity. An experiment using the 11.39 GiB ISOT Botnet Dataset, containing labelled botnet traffic data, compared the SoNSTAR system with three leading machine learning-based traffic classifiers in a botnet activity detection test. SoNSTAR demonstrated greater accuracy, precision and recall and much lower false positive rates than the other techniques. The knowledge generated about characteristic botnet behaviours could be used in the development of future IDSs.
Original languageEnglish
Pages (from-to)33826-33839
JournalIEEE Access
Volume6
DOIs
Publication statusPublished - 14 Jun 2018

Fingerprint

Dive into the research topics of 'Sonification of Network Traffic for Detecting and Learning About Botnet Behavior'. Together they form a unique fingerprint.

Cite this