Detecting the DGA-Based Malicious Domain Names

作者: Ying Zhang , Yongzheng Zhang , Jun Xiao

DOI: 10.1007/978-3-662-43908-1_17

关键词:

摘要: To achieve the goals of concealment and migration, some Bot Nets, such as Conficker, Srizbis Torpig, use Domain Generation Algorithm (DGA) to produce a large number random domain names dynamically. Then small subset these would be selected for actual C&C. Compared with normal names, generated by DGA have significant difference in length, character frequency, etc. Current researches mainly clustering-classification methods Detect abnormal name. Some them NXDomain traffic clustering, other based on classification string features, distribution alphanumeric characters bigram. In fact, name has strict hierarchy each level particular regularities. this paper, hierarchical characteristic is introduced into detection process. We divide distinct levels calculate value separately. level, we entropy, bigram length detections. Because different efficiency levels, design weigh their efficiency. Finally, weighted average levels. Our experiments show that accuracy level-based method higher than 94 %.

参考文章(4)
Sandeep Yadav, A. L. Narasimha Reddy, Winning with DNS Failures: Strategies for Faster Botnet Detection Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. pp. 446- 459 ,(2012) , 10.1007/978-3-642-31909-9_26
Richard Kemmerer, Christopher Kruegel, Giovanni Vigna, Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Your botnet is my botnet: analysis of a botnet takeover computer and communications security. pp. 635- 647 ,(2009) , 10.1145/1653662.1653738
Sandeep Yadav, Ashwath Kumar Krishna Reddy, A.L. Narasimha Reddy, Supranamaya Ranjan, Detecting algorithmically generated malicious domain names internet measurement conference. pp. 48- 61 ,(2010) , 10.1145/1879141.1879148
Ricardo Villamarin-Salomon, Jose Carlos Brustoloni, Identifying Botnets Using Anomaly Detection Techniques Applied to DNS Traffic 2008 5th IEEE Consumer Communications and Networking Conference. pp. 476- 481 ,(2008) , 10.1109/CCNC08.2007.112