Modelling to Simulate Botnet Command and Control Protocols for the Evaluation of Network Intrusion Detection Systems

Georges Bossert 1, 2 Guillaume Hiet 2 Thibaut Henin 1
2 CIDRE - Confidentialité, Intégrité, Disponibilité et Répartition
CentraleSupélec, Inria Rennes – Bretagne Atlantique , IRISA-D1 - SYSTÈMES LARGE ÉCHELLE
Abstract : The purpose of this paper is the modelization and simulation of zombie machines for the evaluation of Network Intrusion Detection Systems (NIDS), used to detect botnets. We propose an automatic method to infer zombies behaviors through the analysis of messages exchanged with their masters. Once computed, a model provides a solution to generate realistic and manageable traffic, which is mandatory for an NIDS evaluation. We propose to use a Stochastic Mealy Machine to model zombies behavior, and an active inference algorithm to learn it. With our approach, it is possible to generate a realistic traffic corresponding to the communications of botnets while ensuring its controllability in the context of an NIDS evaluation.
Type de document :
Communication dans un congrès
SAR-SSI 2011, May 2011, La Rochelle, France. pp.1-8, 2011, 〈10.1109/SAR-SSI.2011.5931397〉
Liste complète des métadonnées

https://hal-supelec.archives-ouvertes.fr/hal-00658396
Contributeur : Anne Cloirec <>
Soumis le : mardi 10 janvier 2012 - 14:12:02
Dernière modification le : mercredi 11 avril 2018 - 02:00:44

Identifiants

Citation

Georges Bossert, Guillaume Hiet, Thibaut Henin. Modelling to Simulate Botnet Command and Control Protocols for the Evaluation of Network Intrusion Detection Systems. SAR-SSI 2011, May 2011, La Rochelle, France. pp.1-8, 2011, 〈10.1109/SAR-SSI.2011.5931397〉. 〈hal-00658396〉

Partager

Métriques

Consultations de la notice

1132