DocumentCode :
3349006
Title :
Analyzing DNS activities of bot processes
Author :
Morales, Jose Andre ; Al-Bataineh, Areej ; Xu, Shouhuai ; Sandhu, Ravi
Author_Institution :
Inst. for Cyber Security, Univ. of Texas at San Antonio, San Antonio, TX, USA
fYear :
2009
fDate :
13-14 Oct. 2009
Firstpage :
98
Lastpage :
103
Abstract :
Detecting bots is becoming increasingly challenging with the sophistication of current bot technology. Most research has focused on identifying infected host machines but is unable to identify the specific bot processes on the host. This research analyzes active bot processes with emphasis on a newly identified vector of detection based on DNS activities occurring throughout the bot life cycle with a primary focus on the early stage of the cycle (i.e., when bots first join a botnet). Specifically, we propose criteria for detecting bot processes based on their reaction-to-DNS-response behavior (RD behavior). Our experimental results confirm that the newly identified vector of detection can, in most cases, accurately identify bot processes during the early stage in their life cycle and can improve detection results of current commercial bot detection software.
Keywords :
Internet; invasive software; peer-to-peer computing; software performance evaluation; DNS activities; DNS response behavior; bot process; domain name system; malware; peer-to-peer botnet; Classification tree analysis; Communication channels; Computer science; Computer security; Data analysis; Detectors; Network servers; Peer to peer computing; Stress;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on
Conference_Location :
Montreal, QC
Print_ISBN :
978-1-4244-5786-1
Type :
conf
DOI :
10.1109/MALWARE.2009.5403014
Filename :
5403014
Link To Document :
بازگشت