Unlock instant, AI-driven research and patent intelligence for your innovation.

A Fast Identification Method for Bitcoin Mining Botnet Traffic

A botnet and identification method technology, applied in the field of rapid identification of mining botnet traffic, can solve problems such as slowing down the detection speed, consuming large resources, and undisclosed data sets, reducing the pressure on storage space and achieving rapid detection capabilities , a wide range of effects

Active Publication Date: 2022-07-19
SOUTHEAST UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these methods have the following main problems: (1) Extracting load information from the data set consumes a lot of resources, and at the same time reduces the speed of detection, making it difficult to use in real-time detection
(2) The features used need to use the entire process of mining botnets, and the time to collect data is too long
(3) It is difficult to obtain the interactive traffic of nodes in the entire botnet, and the communication of a single node cannot be effectively identified
(4) Detecting botnets and cryptocurrency mining separately, without combining the features of the two stages
(5) The data set used is not public, and its detection ability on other data sets cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Fast Identification Method for Bitcoin Mining Botnet Traffic
  • A Fast Identification Method for Bitcoin Mining Botnet Traffic
  • A Fast Identification Method for Bitcoin Mining Botnet Traffic

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] Embodiment 1: The present invention proposes a quick identification method for Bitcoin mining botnet traffic. The identification framework is as follows: image 3 As shown, it is divided into three parts. The first part is the construction of the simulated environment. The specific content is to collect the corresponding mining botnet virus samples, determine the operating environment required by the samples, set the required environment for the virus samples on the virtual machine, and run the virus. The second part is feature extraction, the specific content is to obtain appropriate features through pattern comparison, data analysis and other operations, and use mining virus traffic and normal traffic to construct a traffic data training set; third The part is the generation and verification of the recognition model, the specific content is to divide the test set and the training set, use the cross-validation and grid search methods to select the parameters of the rand...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention proposes a quick identification method for bitcoin mining botnet traffic. The identification framework is divided into three parts. The first part is the construction of the simulated environment, and the specific content is to collect the corresponding mining botnet virus samples and determine the required samples. Set up the required environment for virus samples on the virtual machine, run the virus samples, and obtain the traffic generated by the virus samples; the second part is the extraction of features, and the specific content is to obtain appropriate features through operations such as pattern comparison and data analysis. Use the mining virus traffic and normal traffic to construct the traffic data training set; the third part is the generation and verification of the recognition model, the specific content is to divide the test set and the training set, and use the cross-validation and grid search methods on the training set to randomly The forest algorithm selects the parameters, and after obtaining the corresponding training model, the training model is verified on the test set.

Description

technical field [0001] The invention belongs to the technical field of cyberspace security, and relates to a quick identification method for mining botnet traffic. Background technique [0002] In order to reduce the cost of electricity and infrastructure required for mining, more criminals choose to use a series of malicious software such as mining viruses and mining Trojans to manipulate other people's hosts in order to seek huge profits to achieve the purpose of mining cryptocurrencies. This malicious attack occupies a lot of user resources, seriously affects normal work and life, and also causes irreversible excessive consumption of user equipment. [0003] The current detection of Bitcoin botnet traffic is mainly concentrated in two directions, one is to identify relevant information by extracting packet load information, and the other is to collect the communication traffic of interconnected botnet nodes to graph algorithm Based on this, the clustering coefficient and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06Q40/04G06N20/00
CPCH04L63/1408H04L63/145G06Q40/04G06N20/00H04L2209/56
Inventor 胡晓艳舒卓卓程光吴桦龚俭
Owner SOUTHEAST UNIV