A Study on Botnets Utilizing DNS

作者: Nicole M. Hands , Baijian Yang , Raymond A. Hansen

DOI: 10.1145/2808062.2808070

关键词:

摘要: Botnets represent a major and formidable threat in modern computing, security researchers are engaged constant escalating battle with the writers of such malware to detect mitigate it. Current advanced behaviors include encryption communications between botmaster bot machines as well various strategies for resilience obfuscation. These techniques have taken full advantage infrastructure place support increased connectivity computers around world. This includes updates upgrades DNS that been leveraged meet its utilization. In this paper, we analyze current uses by botnet operators examine possible clues network administrators savvy computer users can utilize identify or threat.

参考文章(15)
David Dagon, Cliff Changchun Zou, Wenke Lee, Modeling Botnet Propagation Using Time Zones. network and distributed system security symposium. ,(2006)
Fabian Monrose, Jay Zarfoss, Moheeb Abu Rajab, Andreas Terzis, My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging conference on workshop on hot topics in understanding botnets. pp. 5- 5 ,(2007)
David Gustafson, Kenton Born, Detecting DNS Tunnels Using Character Frequency Analysis arXiv: Cryptography and Security. ,(2010)
Guofei Gu, Wenke Lee, Junjie Zhang, BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic network and distributed system security symposium. ,(2008)
Moazzam Khan, Zehui Bi, John A. Copeland, Software updates as a security metric: Passive identification of update trends and effect on machine infection MILCOM 2012 - 2012 IEEE Military Communications Conference. pp. 1- 6 ,(2012) , 10.1109/MILCOM.2012.6415869
Sérgio S.C. Silva, Rodrigo M.P. Silva, Raquel C.G. Pinto, Ronaldo M. Salles, Botnets: A survey Computer Networks. ,vol. 57, pp. 378- 403 ,(2013) , 10.1016/J.COMNET.2012.07.021
Florian Tegeler, Xiaoming Fu, Giovanni Vigna, Christopher Kruegel, BotFinder: finding bots in network traffic without deep packet inspection conference on emerging network experiment and technology. pp. 349- 360 ,(2012) , 10.1145/2413176.2413217
Christian Kreibich, Nicholas Weaver, Chris Kanich, Weidong Cui, Vern Paxson, GQ Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference - IMC '11. pp. 397- 412 ,(2011) , 10.1145/2068816.2068854
Allauddin Maria, Azam Farooque, Service Crawling using Google Custom Search API International Journal of Computer Applications. ,vol. 34, pp. 10- 15 ,(2011)