Fast Flux Detection via Data Mining on Passive DNS Traffic

04/17/2018
by   Pierangelo Lombardo, et al.
0

In the last decade, the use of fast flux technique has become established as a common practice to organise botnets in Fast Flux Service Networks (FFSNs), which are platforms able to sustain illegal online services with very high availability. In this paper, we report on an effective fast flux detection algorithm based on the passive analysis of the Domain Name System (DNS) traffic of a corporate network. The proposed method is based on the near-real-time identification of different metrics that measure a wide range of fast flux key features; the metrics are combined via a simple but effective mathematical and data mining approach. The proposed solution has been evaluated in a one-month experiment over an enterprise network, with the injection of pcaps associated with different malware campaigns, that leverage FFSNs and cover a wide variety of attack scenarios. An in-depth analysis of a list of fast flux domains confirmed the reliability of the metrics used in the proposed algorithm and allowed for the identification of many IPs that turned out to be part of two notorious FFSNs, namely Dark Cloud and SandiFlux, to the description of which we therefore contribute. All the fast flux domains were detected with a very low false positive rate; a comparison of performance indicators with previous works show a remarkable improvement.

READ FULL TEXT

page 13

page 14

research
05/04/2022

Early Detection of Spam Domains with Passive DNS and SPF

Spam domains are sources of unsolicited mails and one of the primary veh...
research
10/04/2020

DNS Covert Channel Detection via Behavioral Analysis: a Machine Learning Approach

Detecting covert channels among legitimate traffic represents a severe c...
research
12/04/2017

Learning Fast and Slow: PROPEDEUTICA for Real-time Malware Detection

In this paper, we introduce and evaluate PROPEDEUTICA, a novel methodolo...
research
07/04/2023

K-complex Detection Using Fourier Spectrum Analysis In EEG

K-complexes are an important marker of brain activity and are used both ...
research
02/15/2020

Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS

Cloud Infrastructure as a Service (IaaS) is vulnerable to malware due to...
research
10/04/2019

Digesting Network Traffic for Forensic Investigation Using Digital Signal Processing Techniques

One of the most important practices of cybercrime investigations is to s...
research
12/03/2019

A Complete LoRaWAN Model for Single-Gateway Scenarios

LoRaWAN is a Low Power Wide Area Network technology featuring long trans...

Please sign up or login with your details

Forgot password? Click here to reset