首页> 外文会议> >DNS query failure and algorithmically generated domain-flux detection
【24h】

DNS query failure and algorithmically generated domain-flux detection

机译:DNS查询失败和算法生成的域通量检测

获取原文
获取原文并翻译 | 示例

摘要

Botnets are now recognized as one of the most serious security threats. Recent botnets such as Conficker, Murofet and BankPatch have used domain flux technique to connect to their command and control (C&C) servers, where each Bot queries for existence of a series of domain names used as rendezvous points with their controllers while the owner has to register only one such domain name. The large number of potential rendezvous points makes it difficult for law enforcement to effectively shut down botnets. In this paper we present our methodology for detecting algorithmically generated domain flux. Our detection method is based on DNS query failures resulting from domain flux technique. We process the network traffic, particularly DNS traffic. We analyze all DNS query failures and propose a threshold for DNS query failures from the same IP address. We applied our methodology on packet capture (pcap) file which contains real and long-lived malware traffic and we proved that our methodology can successfully detect domain flux technique and identify the infected host. We also applied our methodology on campus live traffic and showed that it can automatically detect domain flux technique and identify the infected host in the real time.
机译:僵尸网络现在被认为是最严重的安全威胁之一。最近的僵尸网络(例如Conficker,Murofet和BankPatch)已使用域通量技术连接到其命令和控制(C&C)服务器,其中每个Bot都要查询其控制器存在一系列用作集合点的域名,而所有者必须仅注册一个这样的域名。大量潜在的集合点使执法人员很难有效地关闭僵尸网络。在本文中,我们介绍了用于检测算法生成的域通量的方法。我们的检测方法基于域通量技术导致的DNS查询失败。我们处理网络流量,尤其是DNS流量。我们分析所有DNS查询失败,并为来自同一IP地址的DNS查询失败提出阈值。我们将我们的方法应用于包含真实和长期存在的恶意软件流量的数据包捕获(pcap)文件,并且证明了我们的方法可以成功检测域通量技术并识别受感染的主机。我们还将我们的方法应用于校园实时流量,并表明它可以自动检测域流量技术并实时识别受感染的主机。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号