Botnet Attack Detection Using A Hybrid Supervised Fast-Flux Killer System

被引:1
|
作者
Al-Nawasrah, Ahmad [1 ]
Almomani, Ammar [2 ,3 ]
Al-Issa, Huthaifa A. [4 ]
Alissa, Khalid [5 ]
Alrosan, Ayat [6 ]
Alaboudi, Abdulellah A. [7 ]
Gupta, Brij B. [8 ]
机构
[1] British Univ Bahrain, Informat & Commun Technol Coll, Saar, Bahrain
[2] Al Balqa Appl Univ, Al Huson Univ Coll, IT Dept, POB 50, Irbid, Jordan
[3] Skyline Univ Coll, Res & Innovat Dept, POB 1797, Sharjah, U Arab Emirates
[4] Al Balqa Appl Univ, Al Huson Univ Coll, Elect & Elect Engn Dept, As Salt, Jordan
[5] Shaqra Univ, Coll Comp & Informat Technol, POB 33, Riyadh, Saudi Arabia
[6] Imam Abdulrahman Bin Faisal Univ, Dept Networks & Commun, Coll Comp Sci & Informat Technol, Saudi ARAMCO Cybersecur Chair, POB 1982, Dammam 31441, Saudi Arabia
[7] Skyline Univ Coll, Sch Informat Technol, POB 1797, Sharjah, U Arab Emirates
[8] Natl Inst Technol, Dept Comp Engn, Kurukshetra, Haryana, India
来源
JOURNAL OF WEB ENGINEERING | 2022年 / 21卷 / 02期
关键词
Hybrid supervised fast-flux; botnet detection; DeSNN; DDOS ATTACKS; MITIGATION; NETWORKS; DOMAINS;
D O I
10.13052/jwe1540-9589.2123
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A Fast Flux Service Network (FFSN) domain name system method is a technique used on botnet that bot herders used to support malicious botnet actions to rapidly change the domain name IP addresses and to increase the life of malicious servers. While several methods for the detection of FFSN domains are suggested, they are still suffering from relatively low accuracy with the zero-day domain in particular. Throughout the current research, a system that's deemed new is proposed. The latter system is called (the Fast Flux Killer System) and is abbreviated as (FFKS)). It allows one to have the FF-Domains "zero-day", via a deployment built on (ADeSNN). It is a hybrid, which consists of two stages. The online phase according to the learning outcomes from the offline phase works on detecting the zero-day domains while the offline phase helps in enhancing the classification performance of the system in the online phase. This system will be compared to a previously published work that was based on a supervised detection method using the same ADeSNN algorithm to have the FFSNs domains detected, also to show better performance in detecting malicious domains. A public data set for the impacts of the hybrid ADeSNN algorithm is employed in the experiment. When hybrid ADeSNN was used over the supervised one, the experiments showed better accuracy. The detection of zero-day fast-flux domains is highly accurate (99.54%) in a mode considered as an online one.
引用
收藏
页码:179 / 201
页数:23
相关论文
共 50 条
  • [1] Hybrid Detection and Tracking of Fast-Flux Botnet on Domain Name System Traffic
    Zou Futai
    Zhang Siyu
    Rao Weixiong
    CHINA COMMUNICATIONS, 2013, 10 (11) : 81 - 94
  • [2] Fast-flux hunter: a system for filtering online fast-flux botnet
    Almomani, Ammar
    NEURAL COMPUTING & APPLICATIONS, 2018, 29 (07): : 483 - 493
  • [3] Fast-flux hunter: a system for filtering online fast-flux botnet
    Ammar Almomani
    Neural Computing and Applications, 2018, 29 : 483 - 493
  • [4] Fast-flux Botnet Detection from Network Traffic
    Paul, Tuhin
    Tyagi, Rohit
    Manoj, B. S.
    Thanudas, B.
    2014 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2014,
  • [5] As the Net Churns: Fast-Flux Botnet Observations
    Nazario, Jose
    Holz, Thorsten
    MALWARE 2008: PROCEEDINGS OF THE 2008 3RD INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, 2008, : 29 - 36
  • [6] Fast-flux Botnet Detection Method Based on Spatiotemporal Feature of Network Traffic
    Niu W.
    Jiang T.
    Zhang X.
    Xie J.
    Zhang J.
    Zhao Z.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2020, 42 (08): : 1872 - 1880
  • [7] Fast-flux Botnet Detection Method Based on Spatiotemporal Feature of Network Traffic
    Niu Weina
    Jiang Tianyu
    Zhang Xiaosong
    Xie Jiao
    Zhang Junzhe
    Zhao Zhenfei
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (08) : 1872 - 1880
  • [8] Geo-Spatial Autocorrelation as a Metric for the Detection of Fast-Flux Botnet Domains
    Stalmans, Etienne
    Hunter, Samuel Oswald
    Irwin, Barry
    2012 INFORMATION SECURITY FOR SOUTH AFRICA (ISSA), 2012,
  • [9] Fast-Flux Botnet Detection Based on Traffic Response and Search Engines Credit Worthiness
    Cafuta, Davor
    Sruk, Vlado
    Dodig, Ivica
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2018, 25 (02): : 390 - 400
  • [10] Identifying Fast-Flux Botnet With AGD Names at the Upper DNS Hierarchy
    Zang, Xiao-Dong
    Gong, Jian
    Mo, Shao-Huang
    Jakalan, Ahmad
    Ding, De-Lin
    IEEE ACCESS, 2018, 6 : 69713 - 69727