DocumentCode
680130
Title
Botnet detection based on DNS records and active probing
Author
Prieto, Iria ; Magana, Eduardo ; Morato, Daniel ; Izal, Mikel
Author_Institution
Public University of Navarre, Campus Arrosadia, 31006 Pamplona, Spain
fYear
2011
fDate
18-21 July 2011
Firstpage
307
Lastpage
316
Abstract
Computers connected to Internet are constantly threatened by different types of malware. One of the most important malware are botnets that convert infected computers into agents that follow actions instructed by a command-and-control server. A botmaster can control thousands of agents. This means a significant capacity to accomplish any kind of network attack (DoS), email spam or phishing. In this paper, communication peculiarities with the command-and-control server are used to provide an identification of computers infected by a botnet. This identification is based mainly in DNS records of registered domains where command-and-control servers are hosted. Therefore, processing overhead is reduced avoiding per packet or per flow network supervision.
Keywords
Correlation; Electronic mail; Measurement; Microcomputers; Ports (Computers); Proposals; Protocols; Botnet; Command and control; DNS record; Domain name; WHOIS;
fLanguage
English
Publisher
ieee
Conference_Titel
Security and Cryptography (SECRYPT), 2011 Proceedings of the International Conference on
Conference_Location
Seville, Spain
Type
conf
Filename
6732404
Link To Document