Netinfo Security ›› 2024, Vol. 24 ›› Issue (12): 1933-1947.doi: 10.3969/j.issn.1671-1122.2024.12.011

Previous Articles     Next Articles

Automated Botnet Detection Method Based on Two-Stage Graph Learning

ZHANG Xuan1,2, WAN Liang1,2(), LUO Heng1,2, YANG Yang1,2   

  1. 1. College of Computer Science and Technology, Guizhou University, Guiyang 550025, China
    2. State Key Laboratory of Public Big Data, Guizhou University, Guiyang 550025, China
  • Received:2024-09-11 Online:2024-12-10 Published:2025-01-10

Abstract:

Botnets had become one of the most serious threats to network infrastructure. Existing botnet detection methods heavily rely on feature engineering, which significantly limits their detection performance in real-world environments. Botnet detection methods based on raw traffic had more advantages in this aspect, especially when leveraging graphs and raw traffic to enhance the identification of abnormal botnet behaviors, which is the focus of this study. This paper proposed an automated botnet detection method based on two-stage graph learning called Graph2BotNet. The approach involved constructing a flow graph from the interaction packets of each bidirectional network flow and building a communication graph based on the communication topology between IPs. The graph isomorphism network model was used to learn the vector representation of the flow graph, embedding the vector representation into the corresponding communication graph nodes, and finally passing it into the second stage-graph neural networks model to classify the nodes. Graph2BotNet leveraged the graph structure to automatically extract flow graph features and, without requiring extensive expert features, combined graph neural network models to perform two-stage graph learning for fast and accurate botnet detection. The experimental results on the ISCX-2014, CTU-13, and CICIDS2017 botnet datasets demonstrate that Graph2BotNet outperforms the current state-of-the-art methods.

Key words: Botnet detection, deep learning, graph neural networks, network traffic analysis, botnet topology

CLC Number: