DocumentCode :
1592344
Title :
As the net churns: Fast-flux botnet observations
Author :
Nazario, Jose ; Holz, Thorsten
fYear :
2008
Firstpage :
24
Lastpage :
31
Abstract :
While botnets themselves provide a rich platform for financial gain for the botnet master, the use of the infected hosts as webservers can provide an additional botnet use. Botnet herders often use fast-flux DNS techniques to host unwanted or illegal content within a botnet. These techniques change the mapping of the domain name to different bots within the botnet with constant shifting, while the bots simply relay content back to a central server. This can give the attackers additional stepping stones to thwart takedown and can obscure their true origins. Evidence suggests that more attackers are adopting fast-flux techniques, but very little data has been gathered to discover what these botnets are being used for. To address this gap in understanding, we have been mining live traffic to discover new fast-flux domains and then tracking those botnets with active measurements for several months. We identified over 900 fast-flux domain names from early to mid 2008 and monitored their use across the Internet to discern fast-flux botnet behaviors. We found that the active lifetimes of fast-flux botnets vary from less than one day to months, domains that are used in fast-flux operations are often registered but dormant for months prior to activation, that these botnets are associated with a broad range of online fraud and crime activities, and that we can identify distinct botnets across multiple domain names. We support our findings through an in-depth examination of an Internet-scale data continuously collected for hundreds of domain names over several months.
Keywords :
Internet; data mining; security of data; Internet- scale data; fast-flux DNS techniques; fast-flux botnet; live traffic mining; net churns; webservers; Access protocols; Availability; Bandwidth; IP networks; Internet; Knowledge management; Monitoring; Network address translation; Relays; Turning;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Malicious and Unwanted Software, 2008. MALWARE 2008. 3rd International Conference on
Conference_Location :
Fairfax, VI
Print_ISBN :
978-1-4244-3288-2
Electronic_ISBN :
978-1-4244-3289-9
Type :
conf
DOI :
10.1109/MALWARE.2008.4690854
Filename :
4690854
Link To Document :
بازگشت