2012
DOI: 10.1109/tnet.2012.2184552
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Algorithmically Generated Domain-Flux Attacks With DNS Traffic Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
142
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 203 publications
(142 citation statements)
references
References 8 publications
0
142
0
Order By: Relevance
“…While botnets with a fully P2P topology are on the rise, DNS is still abused by cybercriminals to build centralized, yet reliable botnet infrastructures [2,3,8,14,15,21]. An effective technique used to improve resiliency to take downs and tracking is domain flux.…”
Section: Background and Research Gapsmentioning
confidence: 99%
See 2 more Smart Citations
“…While botnets with a fully P2P topology are on the rise, DNS is still abused by cybercriminals to build centralized, yet reliable botnet infrastructures [2,3,8,14,15,21]. An effective technique used to improve resiliency to take downs and tracking is domain flux.…”
Section: Background and Research Gapsmentioning
confidence: 99%
“…Antonakakis et al [3], Yadav et al [21,22], instead, relied on features extracted from groups of domains, which creates the additional problem of how to create such groups. The authors circumvented this problem by choosing random groups of domains.…”
Section: Discovery Modulementioning
confidence: 99%
See 1 more Smart Citation
“…Method 6, we have a blacklist of C&C servers [8], [5], [11], [3], any connection to one of those servers is an attack. Another technique can be used in this step is domain flux technique [28]; an exploited host may try to connect to a large number of domain names which are expected to be C&C servers. The goal of this technique is to make it difficult or even impossible to shut down all of these domain names.…”
Section: Proposed Approachmentioning
confidence: 99%
“…[2]. Sandeep Yadav (2012) detects the automatically generated domain names by looking at distribution of alphanumeric characters as well as bigrams in all domain names that are mapped to the same set of IP-addresses [7]; Fariba Haddadi(2013), with the improved SBB neural network algorithm, alleviates the previous dependence of machine learning on prior knowledge [8]. Moreover, since 2009, Sanjeet, Pawan and Samuel have introduced the word segment techniques in the field of natural language to extract and restructure keywords from domain names for DNS probing and proactive forecast of blacklist [4][5][6].…”
Section: Introductionmentioning
confidence: 99%