A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing

被引:11
作者
Al-Nawasrah, Ahmad [1 ]
Almomani, Ammar Ali [2 ]
Atawneh, Samer [3 ]
Alauthman, Mohammad [4 ]
机构
[1] Taibah Univ, Medina, Saudi Arabia
[2] Al Balqa Appl Univ, Al Huson Univ Coll, Dept Informat Technol, Salt, Jordan
[3] Saudi Elect Univ, Coll Comp & Informat, Riyadh, Saudi Arabia
[4] Zarqa Univ, Fac Informat Technol, Dept Comp Sci, Zarqa, Jordan
关键词
Botnet Detection; Cloud Computing; DNS; Fast-Flux; Neural Network; Zero-Day Domain; NETWORKS;
D O I
10.4018/IJCAC.2020070102
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A botnet refers to a set of compromised machines controlled distantly by an attacker. Botnets are considered the basis of numerous security threats around the world. Command and control (C&C) servers are the backbone of botnet communications, in which bots send a report to the botmaster, and the latter sends attack orders to those bots. Botnets are also categorized according to their C&C protocols, such as internet relay chat (IRC) and peer-to-peer (P2P) botnets. A domain name system (DNS) method known as fast-flux is used by bot herders to cover malicious botnet activities and increase the lifetime of malicious servers by quickly changing the IP addresses of the domain names over time. Several methods have been suggested to detect fast-flux domains. However, these methods achieve low detection accuracy, especially for zero-day domains. They also entail a significantly long detection time and consume high memory storage. In this survey, we present an overview of the various techniques used to detect fast-flux domains according to solution scopes, namely, host-based, router-based, DNS-based, and cloud computing techniques. This survey provides an understanding of the problem, its current solution space, and the future research directions expected.
引用
收藏
页码:17 / 53
页数:37
相关论文
共 103 条
[1]  
Al-Bataineh A., 2012, 2012 7 INT C MAL UNW, DOI [10.1109/MALWARE.2012.6461004, DOI 10.1109/MALWARE.2012.6461004]
[2]   Fast Flux Watch: A mechanism for online detection of fast flux networks [J].
Al-Duwairi, Basheer N. ;
Al-Hammouri, Ahmad T. .
JOURNAL OF ADVANCED RESEARCH, 2014, 5 (04) :473-479
[3]  
Al-Nawasrah A., 2018, 2018 9 INT C INF COM, DOI [10.1109/IACS.2018.8355433, DOI 10.1109/IACS.2018.8355433]
[4]   A P2P Botnet detection scheme based on decision tree and adaptive multilayer neural networks [J].
Alauthaman, Mohammad ;
Aslam, Nauman ;
Zhang, Li ;
Alasem, Rafe ;
Hossain, M. A. .
NEURAL COMPUTING & APPLICATIONS, 2018, 29 (11) :991-1004
[5]   An efficient reinforcement learning-based Botnet detection approach [J].
Alauthman, Mohammad ;
Aslam, Nauman ;
Al-kasassbeh, Mouhammd ;
Khan, Suleman ;
Al-Qerem, Ahmad ;
Choo, Kim-Kwang Raymond .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 150
[6]   DNS rule-based schema to botnet detection [J].
Alieyan, Kamal ;
Almomani, Ammar ;
Anbar, Mohammed ;
Alauthman, Mohammad ;
Abdullah, Rosni ;
Gupta, B. B. .
ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (04) :545-564
[7]   A survey of botnet detection based on DNS [J].
Alieyan, Kamal ;
ALmomani, Ammar ;
Manasrah, Ahmad ;
Kadhum, Mohammed M. .
NEURAL COMPUTING & APPLICATIONS, 2017, 28 (07) :1541-1558
[8]  
Almomani A., 2015, INDIAN J SCI TECHNOL, V8, P260
[9]   A comparative study on spiking neural network encoding schema: implemented with cloud computing [J].
Almomani, Ammar ;
Alauthman, Mohammad ;
Alweshah, Mohammed ;
Dorgham, O. ;
Albalas, Firas .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02) :419-433
[10]   An Online Intrusion Detection System to Cloud Computing Based on Neucube Algorithms [J].
Almomani, Ammar ;
Alauthman, Mohammad ;
Albalas, Firas ;
Dorgham, O. ;
Obeidat, Atef .
INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2018, 8 (02) :96-112