Kindred Domains: Detecting and Clustering Botnet Domains Using DNS Traffic

被引:39
|
作者
Thomas, Matthew [1 ]
Mohaisen, Aziz [1 ]
机构
[1] Verisign Labs, Reston, VA 20190 USA
关键词
Malware; Clustering; Automatic Analysis; DNS;
D O I
10.1145/2567948.2579359
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we focus on detecting and clustering distinct groupings of domain names that are queried by numerous sets of infected machines. We propose to analyze domain name system (DNS) traffic, such as Non-Existent Domain (NXDomain) queries, at several premier Top Level Domain (TLD) authoritative name servers to identify strongly connected cliques of malware related domains. We illustrate typical malware DNS lookup patterns when observed on a global scale and utilize this insight to engineer a system capable of detecting and accurately clustering malware domains to a particular variant or malware family without the need for obtaining a malware sample. Finally, the experimental results of our system will provide a unique perspective on the current state of globally distributed malware, particularly the ones that use DNS.
引用
收藏
页码:707 / 712
页数:6
相关论文
共 50 条
  • [21] Detecting botnet by anomalous traffic
    Chen, Chia-Mei
    Lin, Hsiao-Chung
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 21 : 42 - 51
  • [22] Detection of Malicious Domains Using Passive DNS with XGBoost
    Silveira, Marcos Rogerio
    Cansian, Adriano Mauro
    Kobayashi, Hugo Koji
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2020, : 59 - 61
  • [23] BotCVD: Visual analysis of DNS traffic for botnet detection
    [J]. Jiang, H. (hellojhl@163.com), 1600, Advanced Institute of Convergence Information Technology (04):
  • [24] Botnet detection by monitoring group activities in DNS traffic
    Choi, Hyunsang
    Lee, Hanwoo
    Lee, Heejo
    Kim, Hyogon
    [J]. 2007 CIT: 7TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, : 715 - 720
  • [25] An Imbalanced Malicious Domains Detection Method Based on Passive DNS Traffic Analysis
    Liu, Zhenyan
    Zeng, Yifei
    Zhang, Pengfei
    Xue, Jingfeng
    Zhang, Ji
    Liu, Jiangtao
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [26] Mentor: Positive DNS Reputation to Skim-Off Benign Domains in Botnet C&C Blacklists
    Kheir, Nizar
    Tran, Frederic
    Caron, Pierre
    Deschamps, Nicolas
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 1 - 14
  • [27] A Review of Botnet Detection Approaches Based on DNS Traffic Analysis
    Al-Mashhadi, Saif
    Anbar, Mohammed
    Karuppayah, Shankar
    Al-Ani, Ahmed K.
    [J]. INTELLIGENT AND INTERACTIVE COMPUTING, 2019, 67 : 305 - 321
  • [28] DNS dataset for malicious domains detection
    Marques, Claudio
    Malta, Silvestre
    Magalhaes, Joao Paulo
    [J]. DATA IN BRIEF, 2021, 38
  • [29] XGBoost Applied to Identify Malicious Domains Using Passive DNS
    Silveira, Marcos Rogerio
    da Silva, Leandro Marcos
    Cansian, Adriano Mauro
    Kobayashi, Hugo Koji
    [J]. 2020 IEEE 19TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2020,
  • [30] A Technique for the Botnet Detection Based on DNS-Traffic Analysis
    Pomorova, Oksana
    Savenko, Oleg
    Lysenko, Sergii
    Kryshchuk, Andrii
    Bobrovnikova, Kira
    [J]. COMPUTER NETWORKS, CN 2015, 2015, 522 : 127 - 138