2020
DOI: 10.48550/arxiv.2008.02507
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Intercepting Hail Hydra: Real-Time Detection of Algorithmically Generated Domains

Fran Casino,
Nikolaos Lykousas,
Ivan Homoliak
et al.

Abstract: A crucial technical challenge for cybercriminals is to keep control over the potentially millions of infected devices that build up their botnets, without compromising the robustness of their attacks. A single, fixed C&C server, for example, can be trivially detected either by binary or traffic analysis and immediately sink-holed or taken-down by security researchers or law enforcement. Botnets often use Domain Generation Algorithms (DGAs), primarily to evade take-down mechanisms. DGAs enlarge the lifespan of … Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 28 publications
0
1
0
Order By: Relevance
“…As observed in the studied BDNS systems and due the possibility of having other potential indicators, we believe that exploring and assessing the different data managed by such systems is crucial to design the proper mitigation strategies. For example, parameters such as the amount of suspicious domains registered (e.g., domain squatting [56], or artificially generated domains [61]), the number of wallet updates, the IPs and domains registered, and the connectivity of the nodes are features that can be used to identify potentially harmful user behaviours. The latter can be augmented by our hop-based approach as well as similar methods following blacklisting policies, enhancing the reliability and trust of blockchain DNS while reducing the impact of malicious campaigns.…”
Section: Discussionmentioning
confidence: 99%
“…As observed in the studied BDNS systems and due the possibility of having other potential indicators, we believe that exploring and assessing the different data managed by such systems is crucial to design the proper mitigation strategies. For example, parameters such as the amount of suspicious domains registered (e.g., domain squatting [56], or artificially generated domains [61]), the number of wallet updates, the IPs and domains registered, and the connectivity of the nodes are features that can be used to identify potentially harmful user behaviours. The latter can be augmented by our hop-based approach as well as similar methods following blacklisting policies, enhancing the reliability and trust of blockchain DNS while reducing the impact of malicious campaigns.…”
Section: Discussionmentioning
confidence: 99%