首页> 外文会议>International Conference on Next Generation Computing Technologies >BotMAD: Botnet malicious activity detector based on DNS traffic analysis
【24h】

BotMAD: Botnet malicious activity detector based on DNS traffic analysis

机译:BotMAD:基于DNS流量分析的Botnet恶意活动检测器

获取原文

摘要

Botnet is a collection of infected computers i.e. collection of zombie PCs which are remotely controlled by a single person or a group so called botmaster. In the recent years, botnets are becoming stealthier in nature by implanting certain techniques to hide themselves such as fast flux or DGA algorithms to generate the domain names. Generally, the class of botnet can be categorized into two major class-one which exploiting the IP protocol and another is using the DNS protocol for communications. The bot malwares who are using the DNS protocol are designed to remain unaffected over a long period of time. Once they receive the commands from the botmaster, they start to response to execute further actionable commands to perform SPAMs or DDoS attacks. To address such issues, BotMAD-Botnet Malicious Activity Detection based on DNS traffic pattern analysis is presented to detect such class of botnet family which are not detected by IP protocol based exploiting technique because IP may be changed by the botmaster by using fast flux or other techniques to make them stealth in nature. BotMAD — an automated DNS traffic Analyzer and Detector is introduced which automatically detect the malicious IP/Domain pair by inspecting the DNS packets from the network traces. Further the feed of DNSBL database is integrated with the system by fetching the records of malicious domains through Intel critical-stack API to enrich the database. To validate the accuracy of the system, two data sets are used-one is network traces of bot malwares captured on honeypots and second one domain reputation engines for validation. In the end, we conclude that the developed framework is giving the promising results in the form of botnet domain detection.
机译:僵尸网络是受感染计算机的集合,即僵尸PC的集合,这些僵尸PC由一个人或一个所谓的botmaster远程控制。近年来,僵尸网络通过植入某些隐藏自身的技术(例如快速通量或DGA算法来生成域名)而变得越来越隐秘。通常,僵尸网络的类别可以分为两大类:一类利用IP协议,另一类利用DNS协议进行通信。使用DNS协议的漫游器恶意软件旨在长时间不受影响。一旦他们从僵尸网络管理员那里收到命令,他们就会开始响应,以执行更多可操作的命令来执行SPAM或DDoS攻击。为了解决这些问题,提出了基于DNS流量模式分析的BotMAD-Botnet恶意活动检测,以检测基于IP协议的利用技术无法检测到的此类botnet家族,因为botmaster可能会通过使用快速流量或其他方式更改IP。使它们在自然界中隐形的技术。 BotMAD —引入了自动DNS流量分析器和检测器,它可以通过检查来自网络跟踪的DNS数据包来自动检测恶意IP /域对。此外,通过Intel关键堆栈API提取恶意域的记录以丰富数据库,从而将DNSBL数据库的提要与系统集成在一起。为了验证系统的准确性,使用了两个数据集,一个是在蜜罐上捕获的机器人恶意软件的网络跟踪,另一个是用于验证的域信誉引擎。最后,我们得出的结论是,已开发的框架以僵尸网络域检测的形式给出了令人鼓舞的结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号