International Conference on Frontiers of Communications, Networks and Applications (ICFCNA 2014 - Malaysia) 2014
DOI: 10.1049/cp.2014.1410
|View full text |Cite
|
Sign up to set email alerts
|

DNS query failure and algorithmically generated domain-flux detection

Abstract: Botnets are now recognized as one of the most serious security threats. Recent botnets such as Conficker, Murofet and BankPatch have used domain flux technique to connect to their command and control (C&C) servers, where each Bot queries for existence of a series of domain names used as rendezvous points with their controllers while the owner has to register only one such domain name. The large number of potential rendezvous points makes it difficult for law enforcement to effectively shut down botnets. In thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
4
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…False data assaults require the insertion of false software into meters. A linear factor of the Jacobian power system matrix can be used to manipulate measurements across the network for FDI attacks [37], [42]. The current state approximation methods do not notice this shift in the calculation.…”
Section: Security Systems and Issuesmentioning
confidence: 99%
“…False data assaults require the insertion of false software into meters. A linear factor of the Jacobian power system matrix can be used to manipulate measurements across the network for FDI attacks [37], [42]. The current state approximation methods do not notice this shift in the calculation.…”
Section: Security Systems and Issuesmentioning
confidence: 99%
“…First, eight detection modules are employed to detect the individual APT steps. ese modules are Tor connection detection [11], malicious SSL certicate detection [12], malicious le hash detection [13], malicious domain name detection [14], domain ux detection [15], malicious IP address detection [16], scan detection and disguised exe le detection. Second, a correlation methodology including clustering algorithms is utilised to correlate the steps related to one APT campaign.…”
Section: Introductionmentioning
confidence: 99%
“…For that purpose, eight detection modules are presented, which are disguised exe file detection, malicious file hash detection [15], malicious domain name detection [16], malicious IP address detection [17], malicious SSL certificate detection [18], domain flux detection [19], scan detection, and Tor connection detection [20]. The second phase includes a correlation framework to link the outputs of the detection modules.…”
mentioning
confidence: 99%