首页 | 本学科首页   官方微博 | 高级检索  
     检索      


DFBotKiller: Domain-flux botnet detection based on the history of group activities and failures in DNS traffic
Institution:1. School of Information Technology and Mathematical Sciences, University of South Australia, Australia;2. Department of Information Systems and Cyber Security, University of Texas at San Antonio, USA;1. Department of Information Science and Technology, College of Engineering Guindy, Anna University, Chennai, India;2. Department of Computer Applications, Maulana Azad National Institude of Technology, Bhopal, MP, India
Abstract:Each botnet needs an addressing mechanism to locate its command and control (C&C) server(s). This mechanism allows a botmaster to send commands to and receive stolen data from compromised hosts. To maximize the availability of the C&C server(s), botmasters have recently started to use domain-flux techniques. However, domain-flux botnets have some important characteristics that we can use to detect them. They usually generate a large number of DNS queries resolved to the same IP address and they often generate many failures in DNS traffic. The domain names in the DNS queries are randomly or algorithmically generated and their alphanumeric distribution is significantly different from legitimate ones. In this paper, we present DFBotKiller, a negative reputation system that considers the history of both suspicious group activities and suspicious failures in DNS traffic to detect domain-flux botnets. Our main goal is to automatically assign a high negative reputation score to each host that is involved in these suspicious domain activities. To identify randomly or algorithmically generated domain names, we use three measures, namely the Jensen-Shannon divergence, Spearman's rank correlation coefficient, and Levenshtein distance. We demonstrate the effectiveness of DFBotKiller to detect hosts infected by domain-flux botnets using multiple DNS queries collected from our campus network and a testbed network consisting of some bot-infected hosts. The experimental results show that DFBotKiller can make a good trade-off between the detection and false alarm rates.
Keywords:Botnet detection  Domain-flux botnet  Negative reputation system  Domain group activity  Domain failure
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号