skip to main content
10.1145/2833258.2833310acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoictConference Proceedingsconference-collections
research-article

DGA Botnet detection using Collaborative Filtering and Density-based Clustering

Authors Info & Claims
Published:03 December 2015Publication History

ABSTRACT

In recent years, the botnet phenomenon is one of the most dangerous threat to Internet security, which supports a wide range of criminal activities, including distributed denial of service (DDoS) attacks, click fraud, phishing, malware distribution, spam emails, etc. An increasing number of botnets use Domain Generation Algorithms (DGAs) to avoid detection and exclusion by the traditional methods. By dynamically and frequently generating a large number of random domain names for candidate command and control (C&C) server, botnet can be still survive even when a C&C server domain is identified and taken down. This paper presents a novel method to detect DGA botnets using Collaborative Filtering and Density-Based Clustering. We propose a combination of clustering and classification algorithm that relies on the similarity in characteristic distribution of domain names to remove noise and group similar domains. Collaborative Filtering (CF) technique is applied to find out bots in each botnet, help finding out offline malwares infected-machine. We implemented our prototype system, carried out the analysis of a huge amount of DNS traffic log of Viettel Group and obtain positive results.

References

  1. A. Ramachandran and N. Feamster. Understanding the Network-level Bahavior of Spammers. In ACM SIGCOM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Antonakakis, M., Perdisci, R., Lee, W., Vasiloglou, N., Dagon, D. Detecting malware domains at the upper DNS hierarchy. In USENIX Security, vol. 11, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bilge, L., Balzarotti, D., Robertson, W., Kirda, E., Kruegel, C. Disclosure: detecting botnet command and control servers through large-scale netflow analysis. In ACSAC, ACM. 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Guofei Gu, Roberto Perdisci, Junjie Zhang and Wenke Lee. BotMiner: Clustering Analysis of Network Traffic for Protocol and Structure Independent Botnet Detection. SS'08 Proceedings of the 17th conference on Security symposium, pages 139--154. USENIX Association Berkeley, CA, USA 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Holz T., Gorecki C., Rieck K., Freiling F. C. Measuring and detecting fast-flux service networks. In NDSS. 2008.Google ScholarGoogle Scholar
  6. J. Leyden. Conficker zombie botnet drops to 3.5 million. http://www.theregister.co.uk/2009/04/03/conficker_zombie_count/. 2009.Google ScholarGoogle Scholar
  7. Leyla Bilge, Engin Kirda, Christopher Kruegel, and Marco Balduzzi. EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis. In Proceedings of NDSS, 2011.Google ScholarGoogle Scholar
  8. Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou and Saeed Abu-Nimeh, Wenke Lee and David Dagon. From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware. USENIX Security Conference '12, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. P. Kleissner. Analysis of Sinowal. http://web17.webbpro.de/index.php?page=analysis-of-sinowal. 2008.Google ScholarGoogle Scholar
  10. S. Yadav, A. K. K. Reddy, A. N. Reddy, and S. Ranjan. Detecting algorithmically generated malicious domain names. In Proceedings of the 10th annual Conference on Internet Measurement, IMC '10, pages 48--61. New York, NY, USA, 2010. ACM.. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S. Yadav, A. K. K. Reddy, A. N. Reddy, and S. Ranjan. Detecting algorithmically generated malicious domain names. In Proceedings of the 10th annual Conference on Internet Measurement, IMC '10, pages 48--61. New York, NY, USA, 2010. ACM.. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Yadav and A. N. Reddy. Winning with dns failures: Strategies for faster botnet detection. In 7th International ICST Conference on Security and Privacy in Communication Networks, 2011.Google ScholarGoogle Scholar
  13. Stefano Schiavoni, Federico Maggi, Lorenzo Cavallaro, Stefano Zanero. Tracking and Characterizing Botnets Using Automatically Generated DomainsGoogle ScholarGoogle Scholar
  14. Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C., Vigna, G. Your botnet is my botnet: analysis of a botnet takeover. In: CCS. ACM (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Yong-lin Zhou, Qing-shan Li, Qidi Miao and Kangbin Yim. DGA-Based Botnet Detection Using DNS traffic. Journal of Internet Services and Information Security (JISIS), volume 3, number 3/4, pp. 116--123.Google ScholarGoogle Scholar
  16. The Spamhaus Project. ZEN. http://www.spamhaus.org/zen/.Google ScholarGoogle Scholar
  17. GTBot History. http://golcor.tripod.com/gtbot/gtbot\_history.htmGoogle ScholarGoogle Scholar
  18. Collaborative Filtering. http://en.wikipedia.org/wiki/Collaborative\_filtering.Google ScholarGoogle Scholar
  19. DBSCAN algorithm. http://en.wikipedia.org/wiki/DBSCANGoogle ScholarGoogle Scholar
  20. Hidden Markov Model. http://en.wikipedia.org/wiki/Hidden_Markov_modelGoogle ScholarGoogle Scholar
  21. Spectral Clustering Algorithm. http://en.wikipedia.org/wiki/Spectral_clustering.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    SoICT '15: Proceedings of the 6th International Symposium on Information and Communication Technology
    December 2015
    372 pages
    ISBN:9781450338431
    DOI:10.1145/2833258

    Copyright © 2015 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 3 December 2015

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    SoICT '15 Paper Acceptance Rate49of106submissions,46%Overall Acceptance Rate147of318submissions,46%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader