CCGA: Clustering and Capturing Group Activities for DGA-based botnets detection

被引:7
|
作者
Liu, Zhicheng [1 ,2 ]
Yun, Xiaochun [1 ,3 ]
Zhang, Yongzheng [1 ,2 ]
Wang, Yipeng [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Coordinat Ctr China, Natl Comp Network Emergency Response Tech Team, Beijing, Peoples R China
关键词
botnet; DNS; group behavior; DGA;
D O I
10.1109/TrustCom/BigDataSE.2019.00027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Botnet is a part of the most destructive threats to network security and is often used in malicious activities. DGA-based botnet, which uses Domain Generation Algorithm (DGA) to evade detection, has become the main channel to carry out online crimes. In the past, many detection mechanisms focusing on domain features are proposed, but the potential problem is that the features extracting only from the domain names are insufficient and the enemies could easily forge them to disturb detection. In this paper, we propose a novel approach named CCGA to detect DGA-based botnet by leveraging the concerted group behaviors of infected hosts on DNS traffic. The analysis of group behaviors enhances the robustness of our system irrespective of various evasion techniques, such as fake-querying, packet encryption and noise generated by normal users. The proposed scheme associates hosts together in an unsupervised way and then uses supervised learning to distinguish whether it's a botnet. Our system is evaluated in a large ISP over two days and compared with the state of art FANCI [24]. Experimental results show that CCGA can accurately and effectively detect DGA-based botnet in a real-world network. Our system also catches 5 unknown botnet groups and provides a novel method to verify them. Therefore, the system will provide an unique perspective on the current state of globally distributed malware, particularly the ones that use DNS.
引用
收藏
页码:136 / 143
页数:8
相关论文
共 43 条
  • [1] FProbe:Detecting Stealthy DGA-based Botnets by Group Activities Analysis
    Sun, Jiawei
    Zhou, Yuan
    Wang, Shupeng
    Zhang, Lei
    Liu, Junjiao
    Hou, Junleng
    Liu, Zhicheng
    2020 IEEE 39TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2020,
  • [2] DGA-based botnets detection using DNS traffic mining
    Manasrah, Ahmed M.
    Khdour, Thair
    Freehat, Raeda
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (05) : 2045 - 2061
  • [3] DBod: Clustering and detecting DGA-based botnets using DNS traffic analysis
    Wang, Tzy-Shiah
    Lin, Hui-Tang
    Cheng, Wei-Tsung
    Chen, Chang-Yu
    COMPUTERS & SECURITY, 2017, 64 : 1 - 15
  • [4] Identifying DGA-based botnets using network anomaly detection
    Gavrilut, Dragos Teodor
    Popoiu, George
    Benchea, Razvan
    PROCEEDINGS OF 2016 18TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC), 2016, : 292 - 299
  • [5] A Novel Reputation System to Detect DGA-Based Botnets
    Sharifnya, Reza
    Abadi, Mahdi
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE 2013), 2013, : 417 - 423
  • [6] Detecting DGA-based botnets through effective phonics-based features?
    Zhao, Dan
    Li, Hao
    Sun, Xiuwen
    Tang, Yazhe
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 143 : 105 - 117
  • [7] Adversarial Defense: DGA-Based Botnets and DNS Homographs Detection Through Integrated Deep Learning
    Ravi, Vinayakumar
    Alazab, Mamoun
    Srinivasan, Sriram
    Arunachalam, Ajay
    Soman, K. P.
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2023, 70 (01) : 249 - 266
  • [8] A Novel Approach for Detecting DGA-Based Botnets in DNS Queries Using Machine Learning Techniques
    Soleymani, Ali
    Arabgol, Fatemeh
    JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2021, 2021 (2021)
  • [9] Identifying botnets by capturing group activities in DNS traffic
    Choi, Hyunsang
    Lee, Heejo
    COMPUTER NETWORKS, 2012, 56 (01) : 20 - 33
  • [10] Down to earth! Guidelines for DGA-based Malware Detection
    Cebere, Bogdan
    Flueren, Jonathan
    Sebastian, Silvia
    Plohmann, Daniel
    Rossow, Christian
    PROCEEDINGS OF 27TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2024, 2024, : 147 - 165