DocumentCode :
3658530
Title :
Detection Method of DNS-based Botnet Communication Using Obtained NS Record History
Author :
Hikaru Ichise;Yong Jin;Katsuyoshi Iida
Author_Institution :
Tech. Dept., Tokyo Inst. of Technol., Tokyo, Japan
Volume :
3
fYear :
2015
fDate :
7/1/2015 12:00:00 AM
Firstpage :
676
Lastpage :
677
Abstract :
To combat with botnet, early detection of the botnet communication and fast identification of the bot-infected PCs is very important for network administrators. However, in DNS protocol, which appears to have been used for botnet communication recently, it is difficult to differentiate the ordinary domain name resolution and suspicious communication. Our key idea is that the most of domain name resolutions first obtain the corresponding NS (Name Server) record from authoritative name servers in the Internet, whereas suspicious communication may omit the procedures to hide their malicious activities. Based on this observation, we propose a detection method of DNS basis botnet communication using obtained NS record history. Our proposed method checks whether the destined name server (IP address) of a DNS query is included in the obtained NS record history to detect the botnet communications.
Keywords :
"Servers","Protocols","History","IP networks","Databases","Internet","Conferences"
Publisher :
ieee
Conference_Titel :
Computer Software and Applications Conference (COMPSAC), 2015 IEEE 39th Annual
Electronic_ISBN :
0730-3157
Type :
conf
DOI :
10.1109/COMPSAC.2015.132
Filename :
7273460
Link To Document :
بازگشت