Show simple item record

dc.contributor.authorHaddadi, Fariba
dc.date.accessioned2016-10-13T14:11:45Z
dc.date.available2016-10-13T14:11:45Z
dc.date.issued2016-10-13T14:11:45Z
dc.identifier.urihttp://hdl.handle.net/10222/72238
dc.description.abstractBotnets represent one of the more aggressive threats against cyber security and botnet traffic analysis is one of the main approaches to study and investigate such threats. Botnets employ different techniques (e.g. fluxing and encryption), topologies (e.g. centralized and de-centralized) and communication protocols (e.g. HTTP and DNS) in different stages of their lifecycle. Therefore, identifying the botnets has become very challenging given that they can upgrade their methodology automatically at any time for one reason or another. To this end, different approaches are proposed for botnet traffic analysis and detection based on various botnet behaviours and structures. Hence, the main focus of this thesis is to investigate various botnet detection approaches based on the technique used and the available data. Specifically, two main categories of solutions are explored: application data analysis-based solutions and network analysis-based solutions. In the application data analysis category, two different approaches are explored: one with a priori knowledge and the other one without any a priori knowledge. On the other hand, flow-based botnet detection approaches are explored in the network analysis-based category focused on using minimum a priori knowledge. In this case, various feature extraction methods, machine learning algorithms, protocol filtering, non-numeric feature representation, normal behaviour representation and time generalization issues are investigated. Finally, a flow-based early warning system is proposed. The effectiveness of the solutions is shown on several botnet data sets from IRC botnets to peer-to-peer botnets. Results indicate that the proposed solutions can detect botnet behaviour with good performances. Moreover, two botnet detection systems from the literature and two publicly available malicious behaviour detection systems are employed for further evaluation of the proposed early warning system. The results indicate that the proposed system outperformed these four systems. Last but not least, the proposed system is evaluated as well on botnets in cellular networks on an exploratory basis. It is shown that the proposed system demonstrates promising performance under such circumstances as well.en_US
dc.language.isoenen_US
dc.subjectFlow Feature Analysisen_US
dc.subjectBotnet Detectionen_US
dc.subjectAutomatically Generated Domain Namesen_US
dc.subjectBotnet Behaviour Analysisen_US
dc.subjectComputer viruses
dc.subjectSpyware (Computer software)
dc.subjectComputer security
dc.titleINVESTIGATING A BEHAVIOUR ANALYSIS-BASED EARLY WARNING SYSTEM TO IDENTIFY BOTNETS USING MACHINE LEARNING ALGORITHMSen_US
dc.date.defence2016-09-27
dc.contributor.departmentFaculty of Computer Scienceen_US
dc.contributor.degreeDoctor of Philosophyen_US
dc.contributor.external-examinerNathalie Japkowiczen_US
dc.contributor.graduate-coordinatorMalcolm I. Heywooden_US
dc.contributor.thesis-readerGunes Kayaciken_US
dc.contributor.thesis-readerSrinivas Sampallien_US
dc.contributor.thesis-supervisorA. Nur Zincir-Heywooden_US
dc.contributor.ethics-approvalNot Applicableen_US
dc.contributor.manuscriptsNot Applicableen_US
dc.contributor.copyright-releaseNot Applicableen_US
 Find Full text

Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record