{"title":"Anomaly Detection by Monitoring Unintended DNS Traffic on Wireless Network","authors":"Yong Jin, M. Tomoishi, N. Yamai","doi":"10.1109/PACRIM47961.2019.8985052","DOIUrl":null,"url":null,"abstract":"Cybersecurity threats from malware attacks has become one of the most serious issues in the Internet nowadays. Most types of malware, after intruding an individual computer, attempt to connect the corresponding Command and Control (C&C) servers using IP addresses or Fully Qualified Domain Name (FQDN) and receive further instructions (e.g. attacking target IP addresses and FQDNs) from them in order to conduct subsequent cyber attacks. In recent years, it has been clarified that DNS traffic has been used for communication between the malware infection computers and the C&C servers. In this research, we focus on these peculiarities and propose a method for detecting malware infected computers by monitoring unintended DNS traffic on wireless networks by collaboration with DHCP (Dynamic Host Configuration Protocol) server. By deploying the proposed system on campus wireless networks, the computers within DHCP configured environment can be detected when they are infected by some types of malware and it attempts to communicate with the corresponding C&C servers using DNS (Domain Name System) protocol. In this paper, we describe the detailed design of the proposed method and the future work includes prototype implementation as well as evaluations.","PeriodicalId":152556,"journal":{"name":"2019 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PACRIM47961.2019.8985052","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Cybersecurity threats from malware attacks has become one of the most serious issues in the Internet nowadays. Most types of malware, after intruding an individual computer, attempt to connect the corresponding Command and Control (C&C) servers using IP addresses or Fully Qualified Domain Name (FQDN) and receive further instructions (e.g. attacking target IP addresses and FQDNs) from them in order to conduct subsequent cyber attacks. In recent years, it has been clarified that DNS traffic has been used for communication between the malware infection computers and the C&C servers. In this research, we focus on these peculiarities and propose a method for detecting malware infected computers by monitoring unintended DNS traffic on wireless networks by collaboration with DHCP (Dynamic Host Configuration Protocol) server. By deploying the proposed system on campus wireless networks, the computers within DHCP configured environment can be detected when they are infected by some types of malware and it attempts to communicate with the corresponding C&C servers using DNS (Domain Name System) protocol. In this paper, we describe the detailed design of the proposed method and the future work includes prototype implementation as well as evaluations.