Identifying DGA-based botnets using network anomaly detection

被引:0
|
作者
Gavrilut, Dragos Teodor [1 ]
Popoiu, George [1 ]
Benchea, Razvan [1 ]
机构
[1] Alexandru Ioan Cuza Univ, Fac Comp Sci, Bitdefender Lab, Iasi, Romania
关键词
botnets; anomaly detection; netflow; DGA; DNS; Cryptolocker; Tinba; Patriot; Ramdo; Ramnit; PushDo;
D O I
10.1109/SYNASC.2016.47
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nowadays, the attacks are no longer performed from a single computer but from thousands, sometimes millions of systems that are located all over the globe and are grouped in a network called botnet. The most widely used technique to control a botnet is to try to connect to many domain names, generated according to an algorithm called domain generating algorithm (DGA). In this paper we present different algorithms that can determine if a computer is part of a botnet by looking at its network traffic. Since in some cases the network traffic is impossible to be shared due to privacy reasons we also analyze the case where just limited information can be provided (such as a netflow log). The algorithms presented here were obtained after reverse engineering and analyzing the DGA of 18 different botnets including some that were taken down (such as Cryptolocker) and ones that are still alive and thriving (such as PushDo, Tinba, Nivdort, DirtyLocker, Dobot, Patriot, Ramdo, Virut, Ramnit and many more).
引用
收藏
页码:292 / 299
页数:8
相关论文
共 50 条
  • [31] DGA-Based Botnet Detection Toward Imbalanced Multiclass Learning (vol 26, pg 387, 2021)
    Chen, Yijing
    Pang, Bo
    Shao, Guolin
    Wen, Guozhu
    Chen, Xingshu
    TSINGHUA SCIENCE AND TECHNOLOGY, 2021, 26 (05) : 790 - 790
  • [32] Maximal margin classifiers applied to DGA-based diagnosis of power transformers
    Szczepaniak, Piotr S.
    Klosinski, Marcin
    PRZEGLAD ELEKTROTECHNICZNY, 2012, 88 (02): : 100 - 104
  • [33] DGA-Based Fault Diagnosis Using Self-Organizing Neural Networks with Incremental Learning
    Liu, Siqi
    Xie, Zhiyuan
    Hu, Zhengwei
    ELECTRONICS, 2025, 14 (03):
  • [34] BotCapturer: Detecting botnets based on two-layered analysis with graph anomaly detection and network traffic clustering
    Wang W.
    Wang Y.
    Tan X.
    Liu Y.
    Yang S.
    Wang, Wei (wangwei1@bjtu.edu.cn), 2018, Totem Publishers Ltd (14) : 1050 - 1059
  • [35] Network-based anomaly detection using an Elman network
    Cheng, E
    Jin, H
    Han, ZF
    Sun, JH
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 471 - 480
  • [36] Word encoding for word-looking DGA-based Botnet classification
    Liew, Sea Ran Cleon
    Law, Ngai Fong
    2023 ASIA PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE, APSIPA ASC, 2023, : 1816 - 1821
  • [37] A Physical Model for the Improvement of DGA-based Condition Assessment of Power Transformers
    Riedmann, Christof
    Schichler, Uwe
    2020 8TH INTERNATIONAL CONFERENCE ON CONDITION MONITORING AND DIAGNOSIS (CMD 2020), 2020, : 106 - 109
  • [38] An improved model for detecting DGA botnets using random forest algorithm
    Hoang, Xuan Dau
    Vu, Xuan Hanh
    INFORMATION SECURITY JOURNAL, 2022, 31 (04): : 441 - 450
  • [39] HeapMD: Identifying heap-based bugs using anomaly detection
    Chilimbi, Trishul M.
    Ganapathy, Vinod
    ACM SIGPLAN NOTICES, 2006, 41 (11) : 219 - 228
  • [40] Domain Flux-based DGA Botnet Detection Using Feedforward Neural Network
    Ashiq, Md Ishtiaq
    Bhowmick, Protick
    Hossain, Md Shohrab
    Narman, Husnu S.
    MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,