首页> 外文期刊>Computers & Security >DBod: Clustering and detecting DGA-based botnets using DNS traffic analysis
【24h】

DBod: Clustering and detecting DGA-based botnets using DNS traffic analysis

机译:DBod:使用DNS流量分析对基于DGA的僵尸网络进行群集和检测

获取原文
获取原文并翻译 | 示例
           

摘要

Botnets are one of the leading threats to network security nowadays and are used to conduct a wide variety of malicious activities, including information theft, phishing, spam mail distribution, and Distributed Denial of Service (DDoS) attacks. Among the various forms of botnet, DGA-based botnets, which utilize a Domain Generation Algorithm (DGA) to avoid detection, are one of the most disruptive and difficult to detect. In such botnets, the DGA is used to generate a huge list of candidate Command and Control (C&C) server domains, and the bot then attempts to connect to an active C&C server by querying each DNS server in turn. DGA-based botnets are highly elusive and difficult to detect using traditional defensive mechanisms and therefore have a high survivability. Accordingly, this study proposes a DGA-based botnet detection scheme designated as DBod based on an analysis of the query behavior of the DNS traffic. The proposed scheme exploits the fact that hosts compromised by the same DGA-based malware query the same sets of domains in the domain list and most of these queries fail since only a very limited number of the domains are actually associated with an active C&C. The feasibility of the proposed method is evaluated using the DNS data collected from an education network environment over a period of 26 months. The results show that DBod provides an accurate and effective means of detecting both existing and new DGA-based botnet patterns in real-world networks.
机译:僵尸网络是当今网络安全的主要威胁之一,被用来进行各种恶意活动,包括信息盗窃,网络钓鱼,垃圾邮件分发和分布式拒绝服务(DDoS)攻击。在各种形式的僵尸网络中,利用域生成算法(DGA)避免检测的基于DGA的僵尸网络是最具破坏性和最难检测的僵尸网络之一。在此类僵尸网络中,DGA用于生成大量的命令和控制(C&C)服务器域列表,然后该僵尸程序通过依次查询每个DNS服务器来尝试连接到活动的C&C服务器。基于DGA的僵尸网络非常难以捉摸,很难使用传统防御机制进行检测,因此具有很高的生存能力。因此,本研究基于对DNS流量查询行为的分析,提出了一种基于DGA的僵尸网络检测方案,该方案被指定为DBod。提出的方案利用了这样一个事实,即被相同的基于DGA的恶意软件破坏的主机查询域列表中的相同域集,并且这些查询中的大多数失败,因为只有非常有限的域实际上与活动C&C相关联。使用从教育网络环境中收集的DNS数据(在26个月内)评估了该方法的可行性。结果表明,DBod提供了一种准确有效的手段,可以检测现实网络中现有的和新的基于DGA的僵尸网络模式。

著录项

  • 来源
    《Computers & Security》 |2017年第1期|1-15|共15页
  • 作者单位

    Institute of Computer and Communication Engineering, Department of Electrical Engineering, National Cheng Kung University, Tainan City, Taiwan;

    Institute of Computer and Communication Engineering, Department of Electrical Engineering, National Cheng Kung University, Tainan City, Taiwan;

    Institute of Computer and Communication Engineering, Department of Electrical Engineering, National Cheng Kung University, Tainan City, Taiwan;

    Institute of Computer and Communication Engineering, Department of Electrical Engineering, National Cheng Kung University, Tainan City, Taiwan;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Domain generation algorithm; Botnet detection mechanism; Name error response; Traffic analysis; Network security;

    机译:域生成算法;僵尸网络检测机制;名称错误响应;流量分析;网络安全;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号