Kindred Domains: Detecting and Clustering Botnet Domains Using DNS Traffic

被引:41
|
作者
Thomas, Matthew [1 ]
Mohaisen, Aziz [1 ]
机构
[1] Verisign Labs, Reston, VA 20190 USA
关键词
Malware; Clustering; Automatic Analysis; DNS;
D O I
10.1145/2567948.2579359
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we focus on detecting and clustering distinct groupings of domain names that are queried by numerous sets of infected machines. We propose to analyze domain name system (DNS) traffic, such as Non-Existent Domain (NXDomain) queries, at several premier Top Level Domain (TLD) authoritative name servers to identify strongly connected cliques of malware related domains. We illustrate typical malware DNS lookup patterns when observed on a global scale and utilize this insight to engineer a system capable of detecting and accurately clustering malware domains to a particular variant or malware family without the need for obtaining a malware sample. Finally, the experimental results of our system will provide a unique perspective on the current state of globally distributed malware, particularly the ones that use DNS.
引用
收藏
页码:707 / 712
页数:6
相关论文
共 50 条
  • [41] Subspace Clustering for Interpretable Botnet Traffic Analysis
    Araki, Shohei
    Hu, Bo
    Kamiya, Kazunori
    Tanikawa, Masaki
    Takahashi, Kneji
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [42] Holistic Model for HTTP Botnet Detection Based on DNS Traffic Analysis
    Alenazi, Abdelraman
    Traore, Issa
    Ganame, Karim
    Woungang, Isaac
    INTELLIGENT, SECURE, AND DEPENDABLE SYSTEMS IN DISTRIBUTED AND CLOUD ENVIRONMENTS (ISDDC 2017), 2017, 10618 : 1 - 18
  • [43] BotMAD: Botnet Malicious Activity Detector Based on DNS Traffic Analysis
    Sharma, Pooja
    Kumar, Sanjeev
    Sharma, Neeraj
    PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2016, : 824 - 830
  • [44] AutoEncoded Domains with Mean Activation for DGA Botnet Detection
    Dahal, Binay
    Kim, Yoohwan
    PROCEEDINGS OF 2019 IEEE 12TH INTERNATIONAL CONFERENCE ON GLOBAL SECURITY, SAFETY AND SUSTAINABILITY (ICGS3-2019), 2019, : 149 - +
  • [45] A Novel Approach for Detecting IoT Botnet Using Balanced Network Traffic Attributes
    Shobana, M.
    Poonkuzhali, Sugumaran
    SERVICE-ORIENTED COMPUTING, ICSOC 2020, 2021, 12632 : 534 - 548
  • [46] Detecting Domain-Flux Malware Using DNS Failure Traffic
    Zou, Futai
    Li, Linsen
    Wu, Yue
    Li, Jianhua
    Zhang, Siyu
    Jiang, Kaida
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2018, 28 (02) : 151 - 173
  • [47] CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis
    Dietrich, Christian J.
    Rossow, Christian
    Pohlmann, Norbert
    COMPUTER NETWORKS, 2013, 57 (02) : 475 - 486
  • [48] Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic
    Al-Mashhadi, Saif
    Anbar, Mohammed
    Hasbullah, Iznan
    Alamiedy, Taief Alaa
    PEERJ COMPUTER SCIENCE, 2021, 7 : 1 - 34
  • [49] Internal and external measures in the clustering of scientific domains of reduced domains
    Ingaramo, Diego A.
    Errecalde, Marcelo L.
    Rosso, Paolo
    PROCESAMIENTO DEL LENGUAJE NATURAL, 2007, (39): : 55 - 62
  • [50] DETECTING MICROSCOPIC SUPERCONDUCTING DOMAINS
    BOHR, H
    DAM, NE
    KRAGH, F
    JACOBSEN, CS
    JOURNAL OF PHYSICS E-SCIENTIFIC INSTRUMENTS, 1988, 21 (09): : 908 - 909