Detecting domain-flux botnet based on DNS traffic features in managed network

被引:38
作者
Dinh-Tu Truong [1 ,2 ,3 ]
Cheng, Guang [1 ,2 ]
机构
[1] Southeast Univ, Sch Comp Sci & Engn, Nanjing 210096, Jiangsu, Peoples R China
[2] Southeast Univ, Minist Educ, Key Lab Comp Network & Informat Integrat, Nanjing 210096, Jiangsu, Peoples R China
[3] Tuyhoa Ind Coll, Dept Informat Technol, Phuyen 620900, Vietnam
关键词
network security; botnet; domain fluxing; DNS traffic; SECURITY; ATTACKS;
D O I
10.1002/sec.1495
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern botnets such as Zeus and Conficker commonly utilize a technique called domain fluxing or a domain generation algorithm to generate a large number of pseudo-random domain names (PDNs) dynamically for botnet operators to control their bots. These botnets are becoming one of the most serious threats to Internet security on a global scale. How to prevent their destructive action is one of the most pressing issues of today. In this paper, we focus on detecting domain-flux botnets within the monitored network based on Domain Name System (DNS) traffic features. This method passively captures all DNS traffic from the gateway of a monitored network and then extracts key features to identify PDN. Based on examining and analyzing a large number of legitimate domains as well as PDN generated by botnets, we have discovered that there is a discernible bias in the rules for constructing domain names. Therefore, we introduce a methodology that analyzes DNS traffic to extract the length and the expected value, which can distinguish between a domain name generated by humans or bots. In order to evaluate the effectiveness of the proposed approach, various machine learning algorithms are applied to train predictive models for our detection system. This proposed scheme is implemented and tested in a real local area network. The experimental results show that our proposed method achieves the highest detective efficiency for decision tree algorithms (J48) with an average overall accuracy of up to 92.3% and a false positive rate of 4.8%. Copyright (c) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:2338 / 2347
页数:10
相关论文
共 33 条
[1]   Fast Flux Watch: A mechanism for online detection of fast flux networks [J].
Al-Duwairi, Basheer N. ;
Al-Hammouri, Ahmad T. .
JOURNAL OF ADVANCED RESEARCH, 2014, 5 (04) :473-479
[2]   Security in cloud computing: Opportunities and challenges [J].
Ali, Mazhar ;
Khan, Samee U. ;
Vasilakos, Athanasios V. .
INFORMATION SCIENCES, 2015, 305 :357-383
[3]  
Antonakakis M., 2012, P 21 USENIX SEC S US, P491
[4]  
Bayer U, 2008, VIR B C GEN
[5]   EXPOSURE: A Passive DNS Analysis Service to Detect and Report Malicious Domains [J].
Bilge, Leyla ;
Sen, Sevil ;
Balzarotti, Davide ;
Kirda, Engin ;
Kruegel, Christopher .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2014, 16 (04)
[6]  
Evgeniou T., 2005, SUPPORT VECTOR MACHI, DOI 10.1007/b95439
[7]   DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis [J].
Fadlullah, Zubair M. ;
Taleb, Tarik ;
Vasilakos, Athanasios V. ;
Guizani, Mohsen ;
Kato, Nei .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2010, 18 (04) :1234-1247
[8]   Survey on network-based botnet detection methods [J].
Garcia, Sebastian ;
Zunino, Alejandro ;
Campo, Marcelo .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (05) :878-903
[9]  
Ghorbani AA., 2009, Network Intrusion Detection and Prevention: Concepts and Techniques
[10]  
Guerid H, 2013, 5 INT C COMM SYST NE