skip to main content
10.1145/3011077.3011112acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoictConference Proceedingsconference-collections
research-article

A method for detecting DGA botnet based on semantic and cluster analysis

Published:08 December 2016Publication History

ABSTRACT

Botnets play major roles in a vast number of threats to network security, such as DDoS attacks, generation of spam emails, information theft. Detecting Botnets is a difficult task in due to the complexity and performance issues when analyzing the huge amount of data from real large-scale networks. In major Botnet malware, the use of Domain Generation Algorithms allows to decrease possibility to be detected using white list - blacklist scheme and thus DGA Botnets have higher survival. This paper proposes a DGA Botnet detection scheme based on DNS traffic analysis which utilizes semantic measures such as entropy, meaning the level of the domain, frequency of n-gram appearances and Mahalanobis distance for domain classification. The proposed method is an improvement of Phoenix botnet detection mechanism, where in the classification phase, the modified Mahalanobis distance is used instead of the original for classification. The clustering phase is based on modified k-means algorithm for archiving better effectiveness. The effectiveness of the proposed method was measured and compared with Phoenix, Linguistic and SVM Light methods. The experimental results show the accuracy of proposed Botnet detection scheme ranges from 90 to 99,97% depending on Botnet type.

References

  1. E. Stalmans. 2011. A Framework for DNS-Based Detection and Mitigation of Malware Infections on a Network. Information Security South Africa Conference.Google ScholarGoogle ScholarCross RefCross Ref
  2. S. Yadav, A. K. K. Reddy, A. N. Reddy, and S. Ranjan. 2010. Detecting algorithmically generated malicious domain names. Proceedings of the 10th annual Conference on Internet Measurement. IMC '10, pages 48--61. New York, NY, USA. DOI= http://dl.acm.org/citation.cfm?id=1879148. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Nhauo Davuth, Sung-Ryul Kim. 2013. Classification of Malicious Domain Names using Support Vector Machine and Bi-gram Method. International Journal of Security and Its Applications. Vol. 7, No. 1.Google ScholarGoogle Scholar
  4. T. Joachims. 1999. SVM light, Making large-Scale SVM Learning Practical. Advances in Kernel Methods - Support Vector Learning. B. Schölkopf and C. Burges and A. Smola (eds.). MIT-Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Zhou, Li, Miao, and Yim. DGA-Based Botnet Detection Using DNS Traffic, Journal of Internet Services and Information Security (JISIS). volume: 3, number: 3/4, pages 116--123.Google ScholarGoogle Scholar
  6. Stefano Schiavoni, Federico Maggi, Lorenzo Cavallaro, Stefano Zanero. 2014. Phoenix: DGA-Based Botnet Tracking and Intelligence. Chapter Detection of Intrusions and Malware, and Vulnerability Assessment. Volume 8550 of the series Lecture Notes in Computer Science, pages 192--211, Springer.Google ScholarGoogle Scholar
  7. G. Eason, B. Noble, I. N. Sneddon. 1993. On certain integrals of Eggdrop: Open source IRC bot. http://www.eggheads.org.Google ScholarGoogle Scholar
  8. C. Associates. GTBot. 1998. DOI= http://www3.ca.com/securityadvisor/pest/pest.aspx? id=453073312.Google ScholarGoogle Scholar
  9. Chao Li, Wei Jiang, Xin Zou. 2009. Botnet: Survey and Case Study. Fourth International Conference on Innovative Computing, Information and Control.Google ScholarGoogle Scholar
  10. Rajab MA, Zarfoss J, Monrose F, Terzis A. 2006. A multifaceted approach to understanding the botnet phenomenon. Almeida JM, AlmeidaVAF, Barford P, eds. Proc. of the 6th ACM Internet MeasurementConf. (IMC 2006). Rio de Janeriro: ACM Press, pages 41--52. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Abebe Tesfahun, D.Lalitha Bhaskari. 2013. Botnet Detection and Countermeasures-A Survey. International Journal of Emerging Trends & Technology in Computer Science, Volume 2, Issue 4, July - August.Google ScholarGoogle Scholar
  12. Sophos. 2002. Troj/Agobot-A. DOI= http://www.sophos.com/virusinfo/analyses/trojagobota.html.Google ScholarGoogle Scholar
  13. Sophos. 2002. Troj/SDBot. DOI= http://www.sophos.com/virusinfo/analyses/trojsdbot.html.Google ScholarGoogle Scholar
  14. Phatbot Trojan Analysis. DOI= http://www.secureworks.com/research/threats/phatbot.Google ScholarGoogle Scholar
  15. M. Suenaga, M. Ciubotariu. 2007. Symantec: Trojan.peacomm. DOI= http://www.symantec.com/securityresponse/writeup.jsp?docid=2007011917-1403-99.Google ScholarGoogle Scholar
  16. Ying Zhang, Yongzheng Zhang, Jun Xiao. 2014. Detecting the DGA-Based Malicious Domain Names. ISCTCS 2013, CCIS 426, pages 130--137.Google ScholarGoogle Scholar
  17. Arno Wagner, Bernhard Plattner. Entropy based worm and anomaly detection in fast IP networks. 4th IEEE International Workshops on Enabling Technologies (WETICE 2005), pp 172--177. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Manikopolous C, Papavassiliou S. 2002. Network intrusion and fault detection: a statistical anomaly approach. IEEE Communication.Vol 40. Issue 10, Oct 2002.pp 76--82. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. LZO compression library. DOI= http://www.oberhumer.com/opensource/lzo/.Google ScholarGoogle Scholar

Index Terms

  1. A method for detecting DGA botnet based on semantic and cluster analysis

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      SoICT '16: Proceedings of the 7th Symposium on Information and Communication Technology
      December 2016
      442 pages
      ISBN:9781450348157
      DOI:10.1145/3011077

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 8 December 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      SoICT '16 Paper Acceptance Rate58of132submissions,44%Overall Acceptance Rate147of318submissions,46%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader