Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

Experimental Validation of a Command and Control Traffic Detection Model

Journal Article · · IEEE Transactions on Dependable and Secure Computing
Network intrusion detection systems (NIDS) are commonly used to detect malware communications, including command-and-control (C2) traffic from botnets. NIDS performance assessments have been studied for decades, but mathematical modeling has rarely been used to explore NIDS performance. This paper details a mathematical model that describes a NIDS performing packet inspection and its detection of malware's C2 traffic. Here, the paper further describes an emulation testbed and a set of cyber experiments that used the testbed to validate the model. These experiments included a commonly used NIDS (Snort) and traffic with contents from a pervasive malware (Emotet). Results are presented for two scenarios: a nominal scenario and a “stressed” scenario in which the NIDS cannot process all incoming packets. Model and experiment results match well, with model estimates mostly falling within 95 % confidence intervals on the experiment means. Model results were produced 70-3000 times faster than the experimental results. Consequently, the model's predictive capability could potentially be used to support decisions about NIDS configuration and effectiveness that require high confidence results, quantification of uncertainty, and exploration of large parameter spaces. Furthermore, the experiments provide an example for how emulation testbeds can be used to validate cyber models that include stochastic variability.
Research Organization:
Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)
Sponsoring Organization:
USDOE Laboratory Directed Research and Development (LDRD) Program; USDOE National Nuclear Security Administration (NNSA)
Grant/Contract Number:
NA0003525
OSTI ID:
2311734
Report Number(s):
SAND--2023-03830J
Journal Information:
IEEE Transactions on Dependable and Secure Computing, Journal Name: IEEE Transactions on Dependable and Secure Computing Journal Issue: 3 Vol. 21; ISSN 1545-5971
Publisher:
IEEECopyright Statement
Country of Publication:
United States
Language:
English

References (26)

Survey on network‐based botnet detection methods journal June 2013
Emotet exposed: looking inside highly destructive malware journal June 2019
The 1999 DARPA off-line intrusion detection evaluation journal October 2000
A flow-based approach for Trickbot banking trojan detection journal July 2019
Performance comparison of intrusion detection systems and application of machine learning to Snort system journal March 2018
Improving network intrusion detection system performance through quality of service configuration and parallel technology journal September 2015
Performance Evaluation Study of Intrusion Detection Systems journal January 2011
BotDet: A System for Real Time Botnet Command and Control Traffic Detection journal January 2018
A taxonomy of Botnet detection techniques conference July 2010
Robust Early Stage Botnet Detection using Machine Learning conference October 2020
Botnet: Survey and Case Study conference December 2009
Open Source PowerShell-Written Post Exploitation Frameworks Used by Cyber Espionage Groups conference March 2020
Intrusion detection testing and benchmarking methodologies conference January 2003
National Cyber Range Overview conference October 2014
Detecting Botnets Using Command and Control Traffic conference July 2009
The DETER project: Advancing the science of cyber security experimentation and test conference November 2010
A POMDP Approach to the Dynamic Defense of Large-Scale Cyber Networks journal October 2018
The science of cyber security experimentation: the DETER project conference January 2011
Disclosure conference December 2012
Administrative evaluation of intrusion detection system conference October 2013
Evaluating Computer Intrusion Detection Systems: A Survey of Common Practices journal September 2015
Entropy-based detection of botnet command and control conference January 2017
Cyber threat modeling and validation conference September 2020
Flow-based Detection and Proxy-based Evasion of Encrypted Malware C2 Traffic conference November 2020
Comparing reproduced cyber experimentation studies across different emulation testbeds conference August 2021
Exploration of Multifidelity uq Sampling Strategies for Computer Network Applications journal January 2021

Similar Records

Botnet behaviour analysis: How would a data analytics-based system with minimum a priori information perform?
Journal Article · Mon May 08 20:00:00 EDT 2017 · International Journal of Network Management · OSTI ID:1543482

A hardware-in-the-loop (HIL) testbed for cyber-physical energy systems in smart commercial buildings
Journal Article · Sun Apr 14 20:00:00 EDT 2024 · Science and Technology for the Built Environment · OSTI ID:2567485

Evaluation of Anomaly Detection for Wide-Area Protection Using Cyber Federation Testbed
Conference · Thu Aug 01 00:00:00 EDT 2019 · 2019 IEEE Power & Energy Society General Meeting (PESGM) · OSTI ID:1985673