首页> 外文会议>IEEE Workshop on Secure Network Protocols >Tracking Multiple CC Botnets by Analyzing DNS Traffic
【24h】

Tracking Multiple CC Botnets by Analyzing DNS Traffic

机译:通过分析DNS流量跟踪多个C&C僵尸网络

获取原文

摘要

Botnets have been considered as a main source of Internet threats. A common feature of recent botnets is the use of one or more C&C servers with multiple domain names for the purpose of increasing flexibility and survivability. In contrast with single domain botnets, these multi domain botnets are hard to be quarantined because they change domain names regularly for connecting their C&C server(s). In this paper, we introduce a tracking method of botnets by analyzing the relationship of domain names in DNS traffic generated from botnets. By examining the DNS queries from the clients which accessed the known malicious domain names, we can find a set of unknown malicious domain names and their relationship. This method enables to track malicious domain names and clients duplicately infected by multiple bot codes which make botnets revivable against existing quarantine methods. From the experiments with one hour DNS traffic in an ISP network, we find tens of botnets, and each botnet has tens of malicious domains. In addition to botnet domains, we find a set of other domain names used for spamming or advertising servers. The proposed method can be used for quarantining recent botnets and for limiting their survivability by tracking the change of domain names.
机译:僵尸网络被认为是互联网威胁的主要来源。最近僵尸网络的一个共同特征是使用具有多个域名的一个或多个C&C服务器,以提高灵活性和生存能力。与单个域僵尸网络相比,这些多域僵尸网络很难被隔离,因为它们定期更改域名以连接其C&C服务器。在本文中,我们通过分析从僵尸网络生成的DNS流量中的域名的关系来介绍僵尸网络的跟踪方法。通过检查访问已知的恶意域名的客户端的DNS查询,我们可以找到一组未知的恶意域名及其关系。该方法使得能够跟踪由多个机器码重复感染的恶意域名和客户端,该码对现有隔离方法进行可失去的僵尸网络。从ISP网络中一小时DNS流量的实验中,我们发现了数十个僵尸网络,每个僵尸网络都有几十个恶意域。除了僵尸网络域之外,我们还会找到一组用于垃圾邮件或广告服务器的其他域名。所提出的方法可用于隔离最近的僵尸网络,并通过跟踪域名的变化来限制其生存能力。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号