Abstract
Over the past decade, the digitization of services transformed the healthcare sector leading to a sharp rise in cybersecurity threats. Poor cybersecurity in the healthcare sector, coupled with high value of patient records attracted the attention of hackers. Sophisticated advanced persistent threats and malware have significantly contributed to increasing risks to the health sector. Many recent attacks are attributed to the spread of malicious software, e.g., ransomware or bot malware. Machines infected with bot malware can be used as tools for remote attack or even cryptomining. This paper presents a novel approach, called BotDet, for botnet Command and Control (CC) traffic detection to defend against malware attacks in critical ultrastructure systems. There are two stages in the development of the proposed system: 1) we have developed four detection modules to detect different possible techniques used in botnet CC communications and 2) we have designed a correlation framework to reduce the rate of false alarms raised by individual detection modules. Evaluation results show that BotDet balances the true positive rate and the false positive rate with 82.3% and 13.6%, respectively. Furthermore, it proves BotDet capability of real time detection.
| Original language | English |
|---|---|
| Article number | 8384239 |
| Pages (from-to) | 38947-38958 |
| Number of pages | 12 |
| Journal | IEEE Access |
| Volume | 6 |
| DOIs | |
| State | Published - 13 Jun 2018 |
| Externally published | Yes |
Bibliographical note
Publisher Copyright:© 2013 IEEE.
Keywords
- Critical infrastructure security
- alert correlation
- botnet
- command and control server
- healthcare cyber attacks
- intrusion detection system
- malware
ASJC Scopus subject areas
- General Computer Science
- General Materials Science
- General Engineering