2018
DOI: 10.1002/ett.3505
|View full text |Cite
|
Sign up to set email alerts
|

Thriving on chaos: Proactive detection of command and control domains in internet of things‐scale botnets using DRIFT

Abstract: In this paper, we introduce DRIFT, a system for detecting command and control (C2) domain names in Internet of Things–scale botnets. Using an intrinsic feature of malicious domain name queries prior to their registration (perhaps due to clock drift), we devise a difference‐based lightweight feature for malicious C2 domain name detection. Using NXDomain query and response of a popular malware, we establish the effectiveness of our detector with 99% accuracy and as early as more than 48 hours before they are reg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 37 publications
0
5
0
Order By: Relevance
“…Finally, one paper [70] presented DRIFT, a method for identifying command and control domain names on the Internet of Things botnet scale. By applying an inherent feature of malicious domain name queries preceding registration, they developed a difference-based, lightweight feature for detecting malicious C&C domain names.…”
Section: Ai-based Supervised Learningmentioning
confidence: 99%
“…Finally, one paper [70] presented DRIFT, a method for identifying command and control domain names on the Internet of Things botnet scale. By applying an inherent feature of malicious domain name queries preceding registration, they developed a difference-based, lightweight feature for detecting malicious C&C domain names.…”
Section: Ai-based Supervised Learningmentioning
confidence: 99%
“…Creech and Hu 16 proposed a method for semantic analysis of botnets based on continuous and discontinuous system calls. Spaulding et al 17 designed a system for detecting command and control domain names in Internet of Things scale botnets. Host‐based detection technology has higher accuracy, but detection is time‐consuming and costly.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Related to our use of network features is a line of research on traffic analysis for malware and botnet detection. Such works include [39][40][41][42][43][44], with others paying particular attention to the use of fast-flux techniques [45][46][47][48][49][50]. Support for our use of DNS features for malware analysis comes in [51][52][53].…”
Section: Related Workmentioning
confidence: 99%