Botnet detection by monitoring group activities in DNS traffic

被引:110
作者
Choi, Hyunsang [1 ]
Lee, Hanwoo [1 ]
Lee, Heejo [1 ]
Kim, Hyogon [1 ]
机构
[1] Korea Univ, Seoul, South Korea
来源
2007 CIT: 7TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS | 2007年
关键词
D O I
10.1109/CIT.2007.90
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recent malicious attempts are intended to get financial benefits through a large pool of compromised hosts, which are called software robots or simply "bots." A group of bots, referred to as a botnet, is remotely controllable by a server and can be used for sending spam mails, stealing personal information, and launching DDoS attacks. Growing popularity of botnets compels to find proper countermeasures but existing defense mechanisms hardly catch up with the speed of botnet technologies. In this paper, we propose a botnet detection mechanism by monitoring DNS traffic to detect botnets, which form a group activity in DNS queries simultaneously sent by distributed bots. A few works have been proposed based on particular DNS information generated by a botnet, but they are easily evaded by changing hot programs. Our anomaly-based botnet detection mechanism is more robust than the previous approaches so that the variants of bots can be detectable by looking at their group activities in DNS traffic. From the experiments on a campus network, it is shown that the proposed mechanism can detect botnets effectively while bots are connecting to their server or migrating to another server.
引用
收藏
页码:715 / 720
页数:6
相关论文
共 15 条
[1]  
BARFORD P, 2006, SPEC WORKSH MALW DET
[2]  
BINKLEY JR, 2006, 2 WORKSH STEPS RED U
[3]  
*CIPH, SEC COMP
[4]  
COOKE E, 2005, 1 WORKSH STEPS REDC
[5]  
DAGON D, 2006, NDSS 2006 FEB
[6]  
DAGON D, 2005, OARC WORKSH 2005
[7]  
JONES J, 2003, BOTNETS DETECTION MI
[8]  
Kristoff J., 2004, 32 M N AM NETW OP GR
[9]  
MCPHERSON D, 2005, FINGERPIRNT SHARING
[10]  
OIKARINEN J, 1993, 1459 RFC