Detecting Infected Botnet Machines by the Use of DNS Server Traffic Analysis

Publish Year: 1395
نوع سند: مقاله کنفرانسی
زبان: English
View: 571

This Paper With 10 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ICRSIE02_034

تاریخ نمایه سازی: 11 مرداد 1396

Abstract:

Detection of machines infected with botnets through domain name system (DNS) traffic analysis is a means of confronting a new generation of cyber-attacks. One of today’s security challenges is activity in domain name systems. Botnets are among these new generation of threats. Botnets are centered on DNS and they infect victim computers using Trojans or e-mails to which malicious codes are attached. As a result, botnets cede control of the victim computer to a botmaster to carry out targeted attacks. In this paper, the author studied interactions of botnets with DNS systems and the requests and responses exchanged with DNS systems. The authors also proposed a detection mechanism based on the behavioral pattern of a botnet. The results of this research revealed new anomalies and led to an anomaly detection method.

Keywords:

Domain Name System , botnet , botmaster , command and control (C&C)

Authors

Samaneh Bahrami

Department of Computer Engineering, Science and Research Branch , Islamic Azad University , Tehran , Iran,

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Dewalet D. Definitive Guide to n ex t-Generation threat protection, ...
  • Linh V. DNS traffic alysis for network-bas ed Malware detection, ...
  • Schiavoni S. Finding charactericzin g and tracking domain generation algorithms ...
  • Wang J. Computer Network Security :Theory and Practice, Springer Berlin ...
  • Akkaya D. Honeypots in network security, Bachelor degree project, Linnaeus ...
  • Northcutt S, Novak J. Network Intrusion De tection(Third Edition), Sams ...
  • Symantec white paper. Advanced persistent threats: A symantec perspective, Symantec ...
  • Jiang N. Identifying suspicions activties through DNS failure graph analysis, ...
  • Vern P. Practical comprehen sive Bounds on surrep0titious _ ommunication ...
  • Chappell l. Wireshark Network Analysis the official wireshark certified network ...
  • Wang I. A fast hierachical clustering algorithm for functional modules ...
  • Antonakakis M. From throw-Away Traffic to bots: detecting the rise ...
  • نمایش کامل مراجع