Recognizing Time-Efficiently Local Botnet Infections - A Case Study

Tanja Heuer, Ina Schiering, F. Klawonn, Alexander Gabel, Martin Seeger
{"title":"Recognizing Time-Efficiently Local Botnet Infections - A Case Study","authors":"Tanja Heuer, Ina Schiering, F. Klawonn, Alexander Gabel, Martin Seeger","doi":"10.1109/ARES.2016.16","DOIUrl":null,"url":null,"abstract":"The domain name system (DNS) is often abused by criminals as resilient infrastructure for their network architecture. Examples for malicious activities based on these networks comprise e.g. phishing, click fraud, spam, command and control structure of botnets. Most of the proposed detection methods rely on machine learning based on complex feature sets which require a considerable computational power. This paper investigates the approach of passively monitoring and analyzing DNS traffic in a time efficient manner based on machine learning on a reduced and robust feature set. For the evaluation the full DNS data stream of a regional ISP is used. To enhance the amount of traffic that can be labeled for the training process and reduce the number of false negatives in the case study, this is combined with a semi-manual labeling approach which addresses domains created by Domain-Generation-Algorithms (DGAs). That allows also medium sized, regional service providers to train classifiers with typical DNS traffic and to deploy systems based on the approach proposed here, in the network of organizations as an alternative to cloud services. The evaluation shows that this approach is feasible and prototypes are already deployed. Hence this approach can serve as an important aspect of the internal risk management of organizations.","PeriodicalId":216417,"journal":{"name":"2016 11th International Conference on Availability, Reliability and Security (ARES)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 11th International Conference on Availability, Reliability and Security (ARES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ARES.2016.16","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

The domain name system (DNS) is often abused by criminals as resilient infrastructure for their network architecture. Examples for malicious activities based on these networks comprise e.g. phishing, click fraud, spam, command and control structure of botnets. Most of the proposed detection methods rely on machine learning based on complex feature sets which require a considerable computational power. This paper investigates the approach of passively monitoring and analyzing DNS traffic in a time efficient manner based on machine learning on a reduced and robust feature set. For the evaluation the full DNS data stream of a regional ISP is used. To enhance the amount of traffic that can be labeled for the training process and reduce the number of false negatives in the case study, this is combined with a semi-manual labeling approach which addresses domains created by Domain-Generation-Algorithms (DGAs). That allows also medium sized, regional service providers to train classifiers with typical DNS traffic and to deploy systems based on the approach proposed here, in the network of organizations as an alternative to cloud services. The evaluation shows that this approach is feasible and prototypes are already deployed. Hence this approach can serve as an important aspect of the internal risk management of organizations.
识别时间效率本地僵尸网络感染-一个案例研究
域名系统(DNS)经常被犯罪分子滥用,作为他们网络架构的弹性基础设施。基于这些网络的恶意活动包括网络钓鱼、点击欺诈、垃圾邮件、僵尸网络的命令和控制结构等。大多数提出的检测方法依赖于基于复杂特征集的机器学习,这需要相当大的计算能力。本文研究了基于简化鲁棒特征集的机器学习的被动监控和分析DNS流量的时间效率方法。评估时使用区域ISP的完整DNS数据流。为了提高训练过程中可标记的流量数量,并减少案例研究中的假阴性数量,这与半手动标记方法相结合,该方法处理由域生成算法(DGAs)创建的域。这也允许中等规模的区域性服务提供商使用典型的DNS流量来训练分类器,并根据本文提出的方法在组织网络中部署系统,作为云服务的替代方案。评估表明,该方法是可行的,并且已经部署了原型。因此,这种方法可以作为组织内部风险管理的一个重要方面。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信