Identifying DGA-based botnets using network anomaly detection

被引:0
|
作者
Gavrilut, Dragos Teodor [1 ]
Popoiu, George [1 ]
Benchea, Razvan [1 ]
机构
[1] Alexandru Ioan Cuza Univ, Fac Comp Sci, Bitdefender Lab, Iasi, Romania
关键词
botnets; anomaly detection; netflow; DGA; DNS; Cryptolocker; Tinba; Patriot; Ramdo; Ramnit; PushDo;
D O I
10.1109/SYNASC.2016.47
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nowadays, the attacks are no longer performed from a single computer but from thousands, sometimes millions of systems that are located all over the globe and are grouped in a network called botnet. The most widely used technique to control a botnet is to try to connect to many domain names, generated according to an algorithm called domain generating algorithm (DGA). In this paper we present different algorithms that can determine if a computer is part of a botnet by looking at its network traffic. Since in some cases the network traffic is impossible to be shared due to privacy reasons we also analyze the case where just limited information can be provided (such as a netflow log). The algorithms presented here were obtained after reverse engineering and analyzing the DGA of 18 different botnets including some that were taken down (such as Cryptolocker) and ones that are still alive and thriving (such as PushDo, Tinba, Nivdort, DirtyLocker, Dobot, Patriot, Ramdo, Virut, Ramnit and many more).
引用
收藏
页码:292 / 299
页数:8
相关论文
共 50 条
  • [1] DGA-based botnets detection using DNS traffic mining
    Manasrah, Ahmed M.
    Khdour, Thair
    Freehat, Raeda
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (05) : 2045 - 2061
  • [2] CCGA: Clustering and Capturing Group Activities for DGA-based botnets detection
    Liu, Zhicheng
    Yun, Xiaochun
    Zhang, Yongzheng
    Wang, Yipeng
    2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 136 - 143
  • [3] A Novel Reputation System to Detect DGA-Based Botnets
    Sharifnya, Reza
    Abadi, Mahdi
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE 2013), 2013, : 417 - 423
  • [4] DBod: Clustering and detecting DGA-based botnets using DNS traffic analysis
    Wang, Tzy-Shiah
    Lin, Hui-Tang
    Cheng, Wei-Tsung
    Chen, Chang-Yu
    COMPUTERS & SECURITY, 2017, 64 : 1 - 15
  • [5] Detecting DGA-based botnets through effective phonics-based features?
    Zhao, Dan
    Li, Hao
    Sun, Xiuwen
    Tang, Yazhe
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 143 : 105 - 117
  • [6] BotCensor: Detecting DGA-Based Botnet Using Two-Stage Anomaly Detection
    Biao Qi
    Jiang Jianguo
    Shi Zhixin
    Rui Mao
    Wang Qiwen
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 754 - 762
  • [7] FProbe:Detecting Stealthy DGA-based Botnets by Group Activities Analysis
    Sun, Jiawei
    Zhou, Yuan
    Wang, Shupeng
    Zhang, Lei
    Liu, Junjiao
    Hou, Junleng
    Liu, Zhicheng
    2020 IEEE 39TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2020,
  • [8] Adversarial Defense: DGA-Based Botnets and DNS Homographs Detection Through Integrated Deep Learning
    Ravi, Vinayakumar
    Alazab, Mamoun
    Srinivasan, Sriram
    Arunachalam, Ajay
    Soman, K. P.
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2023, 70 (01) : 249 - 266
  • [9] A Novel Approach for Detecting DGA-Based Botnets in DNS Queries Using Machine Learning Techniques
    Soleymani, Ali
    Arabgol, Fatemeh
    JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2021, 2021 (2021)
  • [10] BotScoop: Scalable detection of DGA based botnets using DNS traffic
    Khehra, Gulbadan
    Sofat, Sanjeev
    2018 9TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2018,