Identifying DGA-based botnets using network anomaly detection

被引:0
|
作者
Gavrilut, Dragos Teodor [1 ]
Popoiu, George [1 ]
Benchea, Razvan [1 ]
机构
[1] Alexandru Ioan Cuza Univ, Fac Comp Sci, Bitdefender Lab, Iasi, Romania
关键词
botnets; anomaly detection; netflow; DGA; DNS; Cryptolocker; Tinba; Patriot; Ramdo; Ramnit; PushDo;
D O I
10.1109/SYNASC.2016.47
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nowadays, the attacks are no longer performed from a single computer but from thousands, sometimes millions of systems that are located all over the globe and are grouped in a network called botnet. The most widely used technique to control a botnet is to try to connect to many domain names, generated according to an algorithm called domain generating algorithm (DGA). In this paper we present different algorithms that can determine if a computer is part of a botnet by looking at its network traffic. Since in some cases the network traffic is impossible to be shared due to privacy reasons we also analyze the case where just limited information can be provided (such as a netflow log). The algorithms presented here were obtained after reverse engineering and analyzing the DGA of 18 different botnets including some that were taken down (such as Cryptolocker) and ones that are still alive and thriving (such as PushDo, Tinba, Nivdort, DirtyLocker, Dobot, Patriot, Ramdo, Virut, Ramnit and many more).
引用
收藏
页码:292 / 299
页数:8
相关论文
共 50 条
  • [21] Detecting DGA-Based Botnet with DNS Traffic Analysis in Monitored Network
    Dinh-Tu Truong
    Cheng, Guang
    Jakalan, Ahmad
    Guo, Xiaojun
    Zhou, Aiping
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 217 - 230
  • [22] Phoenix: DGA-Based Botnet Tracking and Intelligence
    Schiavoni, Stefano
    Maggi, Federico
    Cavallaro, Lorenzo
    Zanero, Stefano
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2014, 2014, 8550 : 192 - 211
  • [23] DGA-based varrescheduling for transmission loss reduction
    Indian Institute of Technology, Delhi, India
    不详
    不详
    不详
    Int J Power Energy Syst, 2009, 4 (255-260):
  • [24] Detection of DGA-based Malware Communications from DoH Traffic Using Machine Learning Analysis
    Mitsuhashi, Rikima
    Jin, Yong
    Iida, Katsuyoshi
    Shinagawa, Takahiro
    Takai, Yoshiaki
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [25] Detection and Blocking of DGA-based Bot Infected Computers by Monitoring NXDOMAIN Responses
    Iuchi, Yuki
    Jin, Yong
    Ichise, Hikaru
    Iida, Katsuyoshi
    Takai, Yoshiaki
    2020 7TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD 2020)/2020 6TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (EDGECOM 2020), 2020, : 82 - 87
  • [26] UMUDGA: A dataset for profiling DGA-based botnet
    Zago, Mattia
    Gil Perez, Manuel
    Martinez Perez, Gregorio
    COMPUTERS & SECURITY, 2020, 92
  • [27] Detecting the DGA-Based Malicious Domain Names
    Zhang, Ying
    Zhang, Yongzheng
    Xiao, Jun
    TRUSTWORTHY COMPUTING AND SERVICES, 2014, 426 : 130 - 137
  • [28] A Novel Approach for Detecting DGA-based Ransomwares
    Salehi, Saeid
    Shahriari, Hamid Reza
    Ahmadian, Mohammad Mehdi
    Tazik, Ladan
    2018 15TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2018,
  • [29] Using Auxiliary Inputs in Deep Learning Models for Detecting DGA-based Domain Names
    Ghosh, Indraneel
    Kumar, Subham
    Bhatia, Ashutosh
    Vishwakarma, Deepak Kumar
    35TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2021), 2021, : 391 - 396
  • [30] Scalable detection of botnets based on DGA Efficient feature discovery process in machine learning techniques
    Zago, Mattia
    Gil Perez, Manuel
    Martinez Perez, Gregorio
    SOFT COMPUTING, 2020, 24 (08) : 5517 - 5537