2008 5th IEEE Consumer Communications and Networking Conference 2008
DOI: 10.1109/ccnc08.2007.112
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Botnets Using Anomaly Detection Techniques Applied to DNS Traffic

Abstract: Abstract-Bots are compromised computers that communicate with a botnet command and control (C&C) server. Bots typically employ dynamic DNS (DDNS) to locate the respective C&C server. By injecting commands into such servers, botmasters can reuse bots for a variety of attacks. We evaluate two approaches for identifying botnet C&C servers based on anomalous DDNS traffic. The first approach consists in looking for domain names whose query rates are abnormally high or temporally concentrated. High DDNS query rates … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
46
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 96 publications
(46 citation statements)
references
References 9 publications
0
46
0
Order By: Relevance
“…Fast-flux techniques are mainly orthogonal to the actual launching of (DNS) tunnels and communication through them. The approach by Villamarin-Salomon and Brustoloni focuses on abnormally high or temporally concentrated query rates of dynamic DNS queries [26]. This does not suffice, however, since such patterns also occur for legitimate purposes.…”
Section: Dns Anomaly Detectionmentioning
confidence: 99%
“…Fast-flux techniques are mainly orthogonal to the actual launching of (DNS) tunnels and communication through them. The approach by Villamarin-Salomon and Brustoloni focuses on abnormally high or temporally concentrated query rates of dynamic DNS queries [26]. This does not suffice, however, since such patterns also occur for legitimate purposes.…”
Section: Dns Anomaly Detectionmentioning
confidence: 99%
“…Botnet DNS traffic exhibits some unique properties like sudden and abnormal increase in DNS request rates mainly due to group activities of bots within a botnet, use of Dynamic DNS (DDNS) and in many cases use of fast-flux service network (FFSN) that results in rapidly changing DNS entries [12] [13]. Moreover, most botnets today uses DNS to find C&C server.…”
Section: Related Workmentioning
confidence: 99%
“…Botnet masters have used IP addresses or IRC servers as C&C servers in the past. Recently, however, they started to use Dynamic DNS, which is able to change the IP address of DNS addresses dynamically to prevent the C&C addresses being blocked [10]. A system that blocks DNS addresses as well as IP addresses is therefore also needed to defend against botnets.…”
Section: General Architecturementioning
confidence: 99%
“…The former approach consists mainly of three technical methods: congestion control [33] [34], network configuration [22] [35], and signature filters [16] [18] [36]. On the other hand, the types of application-based defense mechanisms are much more numerous: client-puzzle [37], IRC-based [23], anomaly-based [10] [27], DNS tracking [25], and attack traffic suppression [24]. In addition to these traditional defense methods, advanced defense methods, such as reverse engineering [20] and honeypot [29] [31], also exist.…”
Section: Related Workmentioning
confidence: 99%