Fast-Flux Botnet Detection Based on Traffic Response and Search Engines Credit Worthiness

被引:6
作者
Cafuta, Davor [1 ]
Sruk, Vlado [2 ]
Dodig, Ivica [1 ]
机构
[1] Zagreb Univ Appl Sci, Vrbik 8, Zagreb 10000, Croatia
[2] Univ Zagreb, Fac Elect Engn & Comp, Unska 3, Zagreb 10000, Croatia
来源
TEHNICKI VJESNIK-TECHNICAL GAZETTE | 2018年 / 25卷 / 02期
关键词
Botnet; fast-flux; IDS; DNS; NETWORKS;
D O I
10.17559/TV-20161012115204
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Botnets are considered as the primary threats on the Internet and there have been many research efforts to detect and mitigate them. Today, Botnet uses a DNS technique fast-flux to hide malware sites behind a constantly changing network of compromised hosts. This technique is similar to trustworthy Round Robin DNS technique and Content Delivery Network (CDN). In order to distinguish the normal network traffic from Botnets different techniques are developed with more or less success. The aim of this paper is to improve Botnet detection using an Intrusion Detection System (IDS) or router. A novel classification method for online Botnet detection based on DNS traffic features that distinguish Botnet from CDN based traffic is presented. Botnet features are classified according to the possibility of usage and implementation in an embedded system. Traffic response is analysed as a strong candidate for online detection. Its disadvantage lies in specific areas where CDN acts as a Botnet. A new feature based on search engine hits is proposed to improve the false positive detection. The experimental evaluations show that proposed classification could significantly improve Botnet detection. A procedure is suggested to implement such a system as a part of IDS.
引用
收藏
页码:390 / 400
页数:11
相关论文
共 37 条
[1]   A survey of botnet detection based on DNS [J].
Alieyan, Kamal ;
ALmomani, Ammar ;
Manasrah, Ahmad ;
Kadhum, Mohammed M. .
NEURAL COMPUTING & APPLICATIONS, 2017, 28 (07) :1541-1558
[2]   New facets of mobile botnet: architecture and evaluation [J].
Anagnostopoulos, Marios ;
Kambourakis, Georgios ;
Gritzalis, Stefanos .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (05) :455-473
[3]  
[Anonymous], 2009, SIGKDD Explorations, DOI DOI 10.1145/1656274.1656278
[4]  
[Anonymous], 2016, GOOGLE PUBLIC DNS FR
[5]  
[Anonymous], 2010, ACM SIGOPSOper. Syst. Rev., DOI DOI 10.1145/1842733.1842736
[6]  
[Anonymous], 1987, RFC 1035, DOI DOI 10.17487/RFC1035
[7]   Economics of Fighting Botnets: Lessons from a Decade of Mitigation [J].
Asghari, Hadi ;
van Eeten, Michel J. G. ;
Bauer, Johannes M. .
IEEE SECURITY & PRIVACY, 2015, 13 (05) :16-23
[8]   EXPOSURE: A Passive DNS Analysis Service to Detect and Report Malicious Domains [J].
Bilge, Leyla ;
Sen, Sevil ;
Balzarotti, Davide ;
Kirda, Engin ;
Kruegel, Christopher .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2014, 16 (04)
[9]  
Brisco Thomas P., 1995, RFC 1794, DOI [10.17487/RFC1794, DOI 10.17487/RFC1794]
[10]  
Broadley C, 2015, 50 REASONS YOUR WEBS