FluXOR: Detecting and monitoring fast-flux service networks

被引:0
|
作者
Passerini, Emanuele [1 ]
Paleari, Roberto [1 ]
Martignoni, Lorenzo [1 ]
Bruschi, Danilo [1 ]
机构
[1] Univ Milan, I-20122 Milan, Italy
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Botnets are large groups of compromised machines (bots) used by miscreants for the most illegal activities (e.g., sending spam emails, denial-of-service attacks, phishing and other web scams). To protect the identity and to maximise the availability of the core components of their business, miscreants have recently started to use fast-flux service networks, large groups of bots acting as front-end proxies to these components. Motivated by the conviction that prompt detection and. monitoring of these networks is an essential step to contrast the problem posed by botnets, we have developed FluXOR, a system to detect and monitor fast-flux service networks. FluXOR monitoring and detection strategies entirely rely on the analysis of a set of features observable from the point of view of a victim of the scams perpetrated thorough botnets. We have been using FluXOR for about a month and so far we have detected 387 fast-flux service networks, totally composed by 31998 distinct compromised machines, which we believe to be associated with 16 botnets.
引用
收藏
页码:186 / 206
页数:21
相关论文
共 50 条
  • [21] Universal Fast-Flux Control of a Coherent, Low-Frequency Qubit
    Zhang, Helin
    Chakram, Srivatsan
    Roy, Tanay
    Earnest, Nathan
    Lu, Yao
    Huang, Ziwen
    Koch, Jens
    Schuster, David, I
    Weiss, D. K.
    PHYSICAL REVIEW X, 2021, 11 (01):
  • [22] Automated Fast-flux Detection using Machine Learning and Genetic Algorithms
    Rana, Sachin
    Aksoy, Ahmet
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (IEEE INFOCOM WKSHPS 2021), 2021,
  • [23] Measurement and Analysis of Global IP-Usage Patterns of Fast-Flux Botnets
    Hu, Xin
    Knysz, Matthew
    Shin, Kang G.
    2011 PROCEEDINGS IEEE INFOCOM, 2011, : 2633 - 2641
  • [24] Geolocalization of Proxied Services and its Application to Fast-Flux Hidden Servers
    Castelluccia, Claude
    Kaafar, Mohamed Ali
    Manils, Pere
    Perito, Daniele
    IMC'09: PROCEEDINGS OF THE 2009 ACM SIGCOMM INTERNET MEASUREMENT CONFERENCE, 2009, : 184 - 189
  • [25] Identifying Fast-Flux Botnet With AGD Names at the Upper DNS Hierarchy
    Zang, Xiao-Dong
    Gong, Jian
    Mo, Shao-Huang
    Jakalan, Ahmad
    Ding, De-Lin
    IEEE ACCESS, 2018, 6 : 69713 - 69727
  • [26] Mitigating DDoS Attacks with Transparent and Intelligent Fast-Flux Swarm Network
    Lua, Ruiping
    Yow, Kin Choong
    IEEE NETWORK, 2011, 25 (04): : 28 - 33
  • [27] Real-Time Detection of Fast Flux Service Networks
    Caglayan, Alper
    Toothaker, Mike
    Drapeau, Dan
    Burke, Dustin
    Eaton, Gerry
    CATCH 2009: CYBERSECURITY APPLICATIONS AND TECHNOLOGY CONFERENCE FOR HOMELAND SECURITY, PROCEEDINGS, 2009, : 285 - 292
  • [28] 基于被动DNS流量的Fast-Flux域名检测方法
    张玉
    刘纪伟
    南京邮电大学学报(自然科学版), 2021, 41 (04) : 74 - 81
  • [29] USE OF PRESENT TREAT CORE AS A FAST-FLUX LOOP-MELTDOWN FACILITY
    DICKERMAN, CE
    TRANSACTIONS OF THE AMERICAN NUCLEAR SOCIETY, 1966, 9 (02): : 551 - +
  • [30] Fast-flux Botnet Detection Method Based on Spatiotemporal Feature of Network Traffic
    Niu W.
    Jiang T.
    Zhang X.
    Xie J.
    Zhang J.
    Zhao Z.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2020, 42 (08): : 1872 - 1880