Detection of Fast-Flux Networks Using Various DNS Feature Sets

被引:0
|
作者
Celik, Z. Berkay [1 ]
Oktug, Serna [1 ]
机构
[1] Istanbul Tech Univ, Dept Comp Engn, TR-34469 Istanbul, Turkey
关键词
network security; Fast-flux Service Networks (FFSNs); feature selection; classification;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, we study the detection of Fast-Flux Service Networks (FFSNs) using DNS (Domain Name System) response packets. We have observed that current approaches do not employ a large combination of DNS features to feed into the proposed detection systems. The lack of features may lead to high false positive or false negative rates triggered by benign activities including Content Distribution Networks (CDNs). In this paper, we study recently proposed detection frameworks to construct a high-dimensional feature vector containing timing, network, spatial, domain name, and DNS response information. In the detection system, we strive to use features that are delayfree, and lightweight in terms of storage and computational cost. Feature sub-spaces are evaluated using a C4.5 decision tree classifier by excluding redundant features using the information gain of each feature with respect to each class. Our experiments reveal the performance of each feature subset type in terms of the classification accuracy. Moreover, we present the best feature subset for the discrimination of FFSNs recorded with the datasets we used.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Detection of fast-flux botnets through DNS traffic analysis
    Soltanaghaei, E.
    Kharrazi, M.
    SCIENTIA IRANICA, 2015, 22 (06) : 2389 - 2400
  • [2] Real-time Malicious Fast-flux Detection Using DNS and Bot Related Features
    Martinez-Bea, Sergi
    Castillo-Perez, Sergio
    Garcia-Alfaro, Joaquin
    2013 ELEVENTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2013, : 369 - 372
  • [3] Fast-flucos: malicious domain name detection method for Fast-flux based on DNS traffic
    Han C.
    Zhang Y.
    Zhang Y.
    Tongxin Xuebao/Journal on Communications, 2020, 41 (05): : 37 - 47
  • [4] CROFlux - Passive DNS method for detecting fast-flux domains
    20143718152448
    (1) Croatian Academic and Research Network - National, CERT, Croatia, 1600, Ericsson Nikola Tesla Zagreb; et al.; HEP - Croatian Electricity Company Zagreb; InfoDom Zagreb; Koncar-Electrical Industries Zagreb; T-Croatian Telecom Zagreb (IEEE Computer Society):
  • [5] CROFlux -Passive DNS Method for Detecting Fast-Flux Domains
    Grzinic, Toni
    Perhoc, Darko
    Maric, Marko
    Vlasic, Filip
    Kulcsar, Tibor
    2014 37TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2014, : 1376 - 1380
  • [6] 基于Fast-Flux的DNS异常行为分析
    李骜骋
    王峥
    计算机工程, 2018, 44 (12) : 184 - 189+195
  • [7] Fast-flux Botnet Detection Method Based on Spatiotemporal Feature of Network Traffic
    Niu W.
    Jiang T.
    Zhang X.
    Xie J.
    Zhang J.
    Zhao Z.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2020, 42 (08): : 1872 - 1880
  • [8] Identifying Fast-Flux Botnet With AGD Names at the Upper DNS Hierarchy
    Zang, Xiao-Dong
    Gong, Jian
    Mo, Shao-Huang
    Jakalan, Ahmad
    Ding, De-Lin
    IEEE ACCESS, 2018, 6 : 69713 - 69727
  • [9] Fast-flux Botnet Detection Method Based on Spatiotemporal Feature of Network Traffic
    Niu Weina
    Jiang Tianyu
    Zhang Xiaosong
    Xie Jiao
    Zhang Junzhe
    Zhao Zhenfei
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (08) : 1872 - 1880
  • [10] Fast-Flux Bot Detection in Real Time
    Hsu, Ching-Hsiang
    Huang, Chun-Ying
    Chen, Kuan-Ta
    RECENT ADVANCES IN INTRUSION DETECTION, 2010, 6307 : 464 - +