Detect Fast-Flux Domains Through Response Time Differences

被引:16
|
作者
Hsu, Fu-Hau [1 ]
Wang, Chuan-Sheng [2 ]
Hsu, Chi-Hsien [1 ]
Tso, Chang-Kuo [1 ]
Chen, Li-Han [1 ]
Lin, Song-Hui [1 ]
机构
[1] Natl Cent Univ, Jhongli 32001, Taiwan
[2] Natl Cent Univ, Dept Comp Sci & Informat Engn, Jhongli 32001, Taiwan
关键词
Security; network-level security and protection; invasive software;
D O I
10.1109/JSAC.2014.2358814
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A fast-flux service network (FFSN) uses dynamic DNS to map a dynamic domain, called fast-flux domain (FF domain), to various IP addresses and uses flux bots to redirect network traffic. Due to its powerful capability to conceal the hosts hidden behind the flux bots, FFSNs are widely adopted by attackers to cover various scams. Although diverse promising solutions have been proposed to detect FF domains, they face the same problem-different countermeasures could be used to bypass their detection. Hence, it becomes a critical issue to develop a new detection solution. According to our survey, unlike normal network services that use dynamic DNS to balance the workloads of their hosts, FFSNs utilize dynamic DNS to hide important bots. As a result, the response time of subsequent requests to an FF domain becomes more fluctuating. Based on the response time differences, this paper develops a new metric, Fast-Flux Score (FF-Score), to detect FF domains. Our system, called fast-flux domain detector (FFDD), is used on a computer that could be an end host or an IDS. A user with a set of unknown URLs, which may be obtained from spam or social networks, can simply determine whether they are benign domains or fast-flux ones using FFDD. Experimental results show that FFDD can accurately detect FF domains with only a 0.3% false positive rate and a 2% false negative rate. It takes less than 20 min for FFDD to determine whether a domain is an FF domain. In addition, FFDD is a lightweight stand-alone system; hence, it does not require special support from an ISP or any other network service.
引用
收藏
页码:1947 / 1956
页数:10
相关论文
共 50 条
  • [1] Formulistic Detection of Malicious Fast-Flux Domains
    Chen, Chia-Mei
    Cheng, Sheng-Tzong
    Chou, Ju-Hsien
    Ou, Ya-Hui
    2012 FIFTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND PROGRAMMING (PAAP), 2012, : 72 - 79
  • [2] Fast-Flux Bot Detection in Real Time
    Hsu, Ching-Hsiang
    Huang, Chun-Ying
    Chen, Kuan-Ta
    RECENT ADVANCES IN INTRUSION DETECTION, 2010, 6307 : 464 - +
  • [3] CROFlux - Passive DNS method for detecting fast-flux domains
    20143718152448
    (1) Croatian Academic and Research Network - National, CERT, Croatia, 1600, Ericsson Nikola Tesla Zagreb; et al.; HEP - Croatian Electricity Company Zagreb; InfoDom Zagreb; Koncar-Electrical Industries Zagreb; T-Croatian Telecom Zagreb (IEEE Computer Society):
  • [4] Fast-flux hunter: a system for filtering online fast-flux botnet
    Almomani, Ammar
    NEURAL COMPUTING & APPLICATIONS, 2018, 29 (07): : 483 - 493
  • [5] CROFlux -Passive DNS Method for Detecting Fast-Flux Domains
    Grzinic, Toni
    Perhoc, Darko
    Maric, Marko
    Vlasic, Filip
    Kulcsar, Tibor
    2014 37TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2014, : 1376 - 1380
  • [6] Detecting Web-Based Botnets with Fast-Flux Domains
    Chen, C.-M. (cchen@mail.nsysu.edu.tw), 1600, Springer Science and Business Media Deutschland GmbH (21):
  • [7] Fast-flux hunter: a system for filtering online fast-flux botnet
    Ammar Almomani
    Neural Computing and Applications, 2018, 29 : 483 - 493
  • [8] A Survey on Fast-flux Attacks
    Zhou, Shijie
    INFORMATION SECURITY JOURNAL, 2015, 24 (4-6): : 79 - 97
  • [9] MalDetect: A Framework to detect Fast Flux Domains
    Mahesh
    Chandavarkar, B. R.
    PROCEEDINGS OF 2018 IEEE DISTRIBUTED COMPUTING, VLSI, ELECTRICAL CIRCUITS AND ROBOTICS (DISCOVER), 2018, : 141 - 146
  • [10] Detection of fast-flux botnets through DNS traffic analysis
    Soltanaghaei, E.
    Kharrazi, M.
    SCIENTIA IRANICA, 2015, 22 (06) : 2389 - 2400