Detecting Domain-Flux Malware Using DNS Failure Traffic

被引:3
|
作者
Zou, Futai [1 ]
Li, Linsen [1 ]
Wu, Yue [1 ]
Li, Jianhua [1 ]
Zhang, Siyu [2 ]
Jiang, Kaida [2 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Cyberspace Secur, Shanghai 200240, Peoples R China
[2] Shanghai Jiao Tong Univ, Network & Informat Ctr, Shanghai 200240, Peoples R China
关键词
DGA; DNS; malware detection; clustering; failure traffic;
D O I
10.1142/S0218194018400016
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Domain-Flux malware is hard to detect because of the variable C&C (Command and Control) domains which were randomly generated by the technique of domain generation algorithm (DGA). In this paper, we propose a Domain-Flux malware detection approach based on DNS failure traffic. The approach fully leverages the behavior of DNS failure traffic to recognize nine features, and then mines the DGA-generated domains by a clustering algorithm and determinable rules. Theoretical analysis and experimental results verify its efficiency with both test dataset and real-world dataset. On the test dataset, our approach can achieve a true positive rate of 99.82% at false positive rate of 0.39%. On the real-world dataset, the approach can also achieve a relatively high precision of 98.3% and find out 197,026 DGA domains by analyzing DNS traffic in campus network for seven days. We found 1213 hosts of Domain-Flux malware existing on campus network, including the known Conficker, Fosniw and several new Domain-Flux malwares that have never been reported before. We classified 197,026 DGA domains and gave the representative generated patterns for a better understanding of the Domain-Flux mechanism.
引用
收藏
页码:151 / 173
页数:23
相关论文
共 50 条
  • [1] Detecting Algorithmically Generated Domain-Flux Attacks With DNS Traffic Analysis
    Yadav, Sandeep
    Reddy, Ashwath Kumar Krishna
    Reddy, A. L. Narasimha
    Ranjan, Supranamaya
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (05) : 1663 - 1677
  • [2] Detecting domain-flux botnet based on DNS traffic features in managed network
    Dinh-Tu Truong
    Cheng, Guang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (14) : 2338 - 2347
  • [3] DFBotKiller: Domain-flux botnet detection based on the history of group activities and failures in DNS traffic
    Sharifnya, Reza
    Abadi, Mahdi
    [J]. DIGITAL INVESTIGATION, 2015, 12 : 15 - 26
  • [4] Detecting APT Malware Infections Based on Malicious DNS and Traffic Analysis
    Zhao, Guodong
    Xu, Ke
    Xu, Lei
    Wu, Bo
    [J]. IEEE ACCESS, 2015, 3 : 1132 - 1142
  • [5] Malware Detection using DNS Records and Domain Name Features
    Al Messabi, Khulood
    Aldwairi, Monther
    Al Yousif, Ayesha
    Thoban, Anoud
    Belqasmi, Fatna
    [J]. ICFNDS'18: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS, 2018,
  • [6] Domain-flux僵尸网络域名检测
    李青山
    陈钟
    [J]. 计算机工程与设计, 2012, 33 (08) : 2915 - 2919
  • [7] Detecting Malware Based on DNS Graph Mining
    Zou, Futai
    Zhang, Siyu
    Rao, Weixiong
    Yi, Ping
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [8] CLEAN : an Approach for Detecting Benign Domain Names based on Passive DNS Traffic
    Han, Chunyu
    Zhang, Yongzheng
    [J]. PROCEEDINGS OF 2017 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2017), 2017, : 343 - 346
  • [9] Detecting Malware Injection with Program-DNS Behavior
    Sun, Yixin
    Jee, Kangkook
    Sivakorn, Suphannee
    Li, Zhichun
    Lumezanu, Cristian
    Korts-Parn, Lauri
    Wu, Zhenyu
    Rhee, Junghwan
    Kim, Chung Hwan
    Chiang, Mung
    Mittal, Prateek
    [J]. 2020 5TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2020), 2020, : 552 - 568
  • [10] Detecting abnormal DNS traffic using unsupervised machine learning
    Thi Quynh Nguyen
    Laborde, Romain
    Benzekri, Abdelmalek
    Qu'hen, Bruno
    [J]. 2020 FOURTH CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2020,