FluXOR: Detecting and monitoring fast-flux service networks

被引:0
|
作者
Passerini, Emanuele [1 ]
Paleari, Roberto [1 ]
Martignoni, Lorenzo [1 ]
Bruschi, Danilo [1 ]
机构
[1] Univ Milan, I-20122 Milan, Italy
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Botnets are large groups of compromised machines (bots) used by miscreants for the most illegal activities (e.g., sending spam emails, denial-of-service attacks, phishing and other web scams). To protect the identity and to maximise the availability of the core components of their business, miscreants have recently started to use fast-flux service networks, large groups of bots acting as front-end proxies to these components. Motivated by the conviction that prompt detection and. monitoring of these networks is an essential step to contrast the problem posed by botnets, we have developed FluXOR, a system to detect and monitor fast-flux service networks. FluXOR monitoring and detection strategies entirely rely on the analysis of a set of features observable from the point of view of a victim of the scams perpetrated thorough botnets. We have been using FluXOR for about a month and so far we have detected 387 fast-flux service networks, totally composed by 31998 distinct compromised machines, which we believe to be associated with 16 botnets.
引用
收藏
页码:186 / 206
页数:21
相关论文
共 50 条
  • [1] An Improvement for Fast-Flux Service Networks Detection Based on Data Mining Techniques
    Chen, Ziniu
    Wang, Jian
    Zhou, Yujian
    Li, Chunping
    ROUGH SETS, FUZZY SETS, DATA MINING AND GRANULAR COMPUTING, RSFDGRC 2011, 2011, 6743 : 302 - 309
  • [2] Fast-flux hunter: a system for filtering online fast-flux botnet
    Almomani, Ammar
    NEURAL COMPUTING & APPLICATIONS, 2018, 29 (07): : 483 - 493
  • [3] CROFlux - Passive DNS method for detecting fast-flux domains
    20143718152448
    (1) Croatian Academic and Research Network - National, CERT, Croatia, 1600, Ericsson Nikola Tesla Zagreb; et al.; HEP - Croatian Electricity Company Zagreb; InfoDom Zagreb; Koncar-Electrical Industries Zagreb; T-Croatian Telecom Zagreb (IEEE Computer Society):
  • [4] CROFlux -Passive DNS Method for Detecting Fast-Flux Domains
    Grzinic, Toni
    Perhoc, Darko
    Maric, Marko
    Vlasic, Filip
    Kulcsar, Tibor
    2014 37TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2014, : 1376 - 1380
  • [5] Fast-flux hunter: a system for filtering online fast-flux botnet
    Ammar Almomani
    Neural Computing and Applications, 2018, 29 : 483 - 493
  • [6] Genetic-based Real-time Fast-Flux Service Networks Detection
    Lin, Hui-Tang
    Lin, Ying-You
    Chiang, Jui-Wei
    COMPUTER NETWORKS, 2013, 57 (02) : 501 - 513
  • [7] Detecting Web-Based Botnets with Fast-Flux Domains
    Chen, C.-M. (cchen@mail.nsysu.edu.tw), 1600, Springer Science and Business Media Deutschland GmbH (21):
  • [8] A Survey on Fast-flux Attacks
    Zhou, Shijie
    INFORMATION SECURITY JOURNAL, 2015, 24 (4-6): : 79 - 97
  • [9] Detection of Fast-Flux Networks Using Various DNS Feature Sets
    Celik, Z. Berkay
    Oktug, Serna
    2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
  • [10] Detecting Malicious Fast-Flux Domains Using Feature-based Classification Techniques
    Truong, Dinh-Tu
    Tran, Dac-Tot
    Huynh, Bao
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (04): : 1061 - 1072