Encrypted and Covert DNS Queries for Botnets: Challenges and Countermeasures

09/16/2019
by   Constantinos Patsakis, et al.
0

There is a continuous increase in the sophistication that modern malware exercise in order to bypass the deployed security mechanisms. A typical approach to evade the identification and potential takedown of a botnet command and control server is domain fluxing through the use of Domain Generation Algorithms (DGAs). These algorithms produce a vast amount of domain names that the infected device tries to communicate with to find the C C server, yet only a small fragment of them is actually registered. This allows the botmaster to pivot the control and make the work of seizing the botnet control rather difficult. Current state of the art and practice considers that the DNS queries performed by a compromised device are transparent to the network administrator and therefore can be monitored, analysed, and blocked. In this work, we showcase that the latter is a strong assumption as malware could efficiently hide its DNS queries using covert and/or encrypted channels bypassing the detection mechanisms. To this end, we discuss possible mitigation measures based on traffic analysis to address the new challenges that arise f

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/12/2019

Exploiting Statistical and Structural Features for the Detection of Domain Generation Algorithms

Nowadays, malware campaigns have reached a high level of sophistication,...
research
04/17/2023

Detecting Domain-Generation Algorithm (DGA) Based Fully-Qualified Domain Names (FQDNs) with Shannon Entropy

Domain Name System (DNS) is the backbone of the Internet. However, threa...
research
08/06/2020

Intercepting Hail Hydra: Real-Time Detection of Algorithmically Generated Domains

A crucial technical challenge for cybercriminals is to keep control over...
research
10/22/2018

Challenges in Network Management of Encrypted Traffic

This paper summarizes the challenges identified at the MAMI Management a...
research
09/10/2022

GITCBot: A Novel Approach for the Next Generation of C&C Malware

Online Social Networks (OSNs) attracted millions of users in the world. ...
research
07/14/2023

Assessing and Exploiting Domain Name Misinformation

Cloud providers' support for network evasion techniques that misrepresen...
research
10/22/2020

Malware Traffic Classification: Evaluation of Algorithms and an Automated Ground-truth Generation Pipeline

Identifying threats in a network traffic flow which is encrypted is uniq...

Please sign up or login with your details

Forgot password? Click here to reset