International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 180 - Number 47 |
Year of Publication: 2018 |
Authors: Seshadri Rao Chinta, Vinod Babu Polinati, P. N. Srinivas |
10.5120/ijca2018917241 |
Seshadri Rao Chinta, Vinod Babu Polinati, P. N. Srinivas . Detecting Bots inside a Host using Network Behavior Analysis. International Journal of Computer Applications. 180, 47 ( Jun 2018), 1-4. DOI=10.5120/ijca2018917241
Being well aware of the drastic changes brought by the Internet to the world there exists an explosion of network traffic. This burst traffic brings in lots of unwanted communication as a side-effect from the infected machines also called victims. Bots are such type of infected machines which work under a super power called botmaster. A botnet is a collection of compromised machines or bots receiving and responding to commands from the Command and Control (C&C) server that serves as a rendezvous mechanism for commands from a human or controller i.e., the bot master. The aim of our work is to detect the presence of the bot in the network traffic. This is accomplished in a two-step process. The work first captures network traffic from the infected host, and second step analyzes the captured traffic and detects the presence of a bot. To meet the goal we experimented on CTU-13 data set, a data set of botnet traffic captured in the CTU University, Czech Republic. Our work uses decision trees, Naïve Bayes, SVM and K Nearest Neighbor to detect the presence of bot. We found that decision trees gives 99.9% positive detection rate compared to other algorithms.