BotGraph- Large Scale Spamming Botnet Detection.ppt
《BotGraph- Large Scale Spamming Botnet Detection.ppt》由会员分享,可在线阅读,更多相关《BotGraph- Large Scale Spamming Botnet Detection.ppt(27页珍藏版)》请在麦多课文档分享上搜索。
1、BotGraph: Large Scale Spamming Botnet Detection,Yao ZhaoYinglian Xie*, Fang Yu*, Qifa Ke*, Yuan Yu*, Yan Chen and Eliot Gillum EECS Department, Northwestern University Microsoft Research Silicon Valley* Microsoft Cooperation ,1,2,Web-Account Abuse Attack,Zombie (Compromised host),Spammers Server,Cap
2、tcha solver,RDSXXTD3,User/Pwd,Problems and Challenges,Detect Web-account Abuse with Hotmail Logs Input: user activity traces (signup, login, email-sending records) Goal: stop aggressive account signup, limit outgoing spamChallenges Attack is stealthy: individual account detection difficult Attack is
3、 large scale: finding correlated activities 500 million accounts 300GB-400GB data per month Low false positive and false negative rate,3,4,The BotGraph System,A graph-based approach to attack detection A large user-user graph to capture bot-account correlations Identify 26M bot-accounts with a low f
4、alse positive rate in two months Efficient implementation using Dryad/DryadLINQ Graph construction/analysis is not easily parallelizable Hundreds of millions of nodes, hundreds of billions of edges Process 200GB-300GB data in 1.5 hours with a 240-machine clusterThe first to provide a systematic solu
5、tion to the new botnet-based web-account abuse attack,System Architecture,5,Login data,Login graph,Graph generation,Random graph based clustering,Verification & prune,EWMA based change detection,Verification & prune,3. Parallel algorithm on DryadLINQ clusters,(ID, IP, time),(ID, time, # of recipient
6、s),(ID, IP, time),1. History based algorithm to detect aggressive signups,2. Graph-based algorithm to find correlations,6,Detect Aggressive Signups,Large prediction error,Back to normal,Date,Number of Signup Accounts,25,20,15,10,5,1-Jul,2-Jul,3-Jul,4-Jul,5-Jul,6-Jul,7-Jul,8-Jul,9-Jul,Signup Count,EW
7、MA Prediction,Simple and efficientDetect 20 million malicious accounts in 2 months,System Architecture,7,Login data,Login graph,Graph generation,Random graph based clustering,Verification & prune,EWMA based change detection,Verification & prune,3. Parallelel Algorithm on DryadLinq clusters,(ID, IP,
8、time),(ID, time, # of recipients),(ID, IP, time),1. History based algorithm on Signup detection,2. Graph-based algorithm on login detection,8,Observation: bot-accounts work collaborativelyNormal Users Share IP addresses in one AS with DHCP assignment Bot-users,Detect Stealthy Accounts by Graphs,A us
9、er-user graph to model behavior similarities,9,Observation: bot-accounts work collaborativelyNormal Users Share IP addresses in one AS with DHCP assignment Bot-users Likely to share different IPs across ASes,Detect Stealthy Accounts by Graphs,A user-user graph to model behavior similarities,User-use
10、r Graph,Node: Hotmail account Edge weight: # of ASes of the shared IP addresses Consider edges with weight1Key Observations Bot-users form a giant connected-component while normal users do not Interpreted by the random graph theory,10,2 ASes,3 ASes,5 ASes,1 AS,4 ASes,User1,User2,User3,User4,User5,Us
11、er6,Random Graph Theory,Random Graph G(n,p) n nodes and each pair of nodes has an edge with probability p and average degree d = (n-1) p Theorem If d 1, with high probability the graph will contain a giant component with size at the order of O(n)Most nodes are in one connected subgraph,11,Graph-base
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- BOTGRAPHLARGESCALESPAMMINGBOTNETDETECTIONPPT
