A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing

被引:11
|
作者
Al-Nawasrah, Ahmad [1 ]
Almomani, Ammar Ali [2 ]
Atawneh, Samer [3 ]
Alauthman, Mohammad [4 ]
机构
[1] Taibah Univ, Medina, Saudi Arabia
[2] Al Balqa Appl Univ, Al Huson Univ Coll, Dept Informat Technol, Salt, Jordan
[3] Saudi Elect Univ, Coll Comp & Informat, Riyadh, Saudi Arabia
[4] Zarqa Univ, Fac Informat Technol, Dept Comp Sci, Zarqa, Jordan
关键词
Botnet Detection; Cloud Computing; DNS; Fast-Flux; Neural Network; Zero-Day Domain; NETWORKS;
D O I
10.4018/IJCAC.2020070102
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A botnet refers to a set of compromised machines controlled distantly by an attacker. Botnets are considered the basis of numerous security threats around the world. Command and control (C&C) servers are the backbone of botnet communications, in which bots send a report to the botmaster, and the latter sends attack orders to those bots. Botnets are also categorized according to their C&C protocols, such as internet relay chat (IRC) and peer-to-peer (P2P) botnets. A domain name system (DNS) method known as fast-flux is used by bot herders to cover malicious botnet activities and increase the lifetime of malicious servers by quickly changing the IP addresses of the domain names over time. Several methods have been suggested to detect fast-flux domains. However, these methods achieve low detection accuracy, especially for zero-day domains. They also entail a significantly long detection time and consume high memory storage. In this survey, we present an overview of the various techniques used to detect fast-flux domains according to solution scopes, namely, host-based, router-based, DNS-based, and cloud computing techniques. This survey provides an understanding of the problem, its current solution space, and the future research directions expected.
引用
收藏
页码:17 / 53
页数:37
相关论文
共 50 条
  • [1] Fast-flux Botnet Detection from Network Traffic
    Paul, Tuhin
    Tyagi, Rohit
    Manoj, B. S.
    Thanudas, B.
    2014 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2014,
  • [2] Fast-flux hunter: a system for filtering online fast-flux botnet
    Ammar Almomani
    Neural Computing and Applications, 2018, 29 : 483 - 493
  • [3] Fast-flux hunter: a system for filtering online fast-flux botnet
    Almomani, Ammar
    NEURAL COMPUTING & APPLICATIONS, 2018, 29 (07): : 483 - 493
  • [4] As the Net Churns: Fast-Flux Botnet Observations
    Nazario, Jose
    Holz, Thorsten
    MALWARE 2008: PROCEEDINGS OF THE 2008 3RD INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, 2008, : 29 - 36
  • [5] A genomic rule-based KNN model for fast flux botnet detection
    Ayo, Femi Emmanuel
    Awotunde, Joseph Bamidele
    Folorunso, Sakinat Oluwabukonla
    Adigun, Matthew O.
    Ajagbe, Sunday Adeola
    EGYPTIAN INFORMATICS JOURNAL, 2023, 24 (02) : 313 - 325
  • [6] Hiding Fast Flux Botnet in Plain Email Sight
    Wang, Zhi
    Qin, Meilin
    Chen, Mengqi
    Jia, Chunfu
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 239 : 182 - 197
  • [7] Fast Flux Watch: A mechanism for online detection of fast flux networks
    Al-Duwairi, Basheer N.
    Al-Hammouri, Ahmad T.
    JOURNAL OF ADVANCED RESEARCH, 2014, 5 (04) : 473 - 479
  • [8] Fast-flux Botnet Detection Method Based on Spatiotemporal Feature of Network Traffic
    Niu Weina
    Jiang Tianyu
    Zhang Xiaosong
    Xie Jiao
    Zhang Junzhe
    Zhao Zhenfei
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2020, 42 (08) : 1872 - 1880
  • [9] Botnet Attack Detection Using A Hybrid Supervised Fast-Flux Killer System
    Al-Nawasrah, Ahmad
    Almomani, Ammar
    Al-Issa, Huthaifa A.
    Alissa, Khalid
    Alrosan, Ayat
    Alaboudi, Abdulellah A.
    Gupta, Brij B.
    JOURNAL OF WEB ENGINEERING, 2022, 21 (02): : 179 - 201
  • [10] Hybrid Detection and Tracking of Fast-Flux Botnet on Domain Name System Traffic
    Zou Futai
    Zhang Siyu
    Rao Weixiong
    CHINA COMMUNICATIONS, 2013, 10 (11) : 81 - 94