Download PDFOpen PDF in browser

A Multi-Stage Detection Technique for DNS-Tunneled Botnets

7 pagesPublished: March 13, 2019

Abstract

Botnet communications are obfuscated within legitimate network protocols to avoid detection and remediation. Domain Name Service (DNS) is a protocol of choice to hide communication with Command & Control (C&C) servers, where botmasters tunnel these communications within DNS request and response. Since botnet communications are characterized by different features, botmasters may evade detection methods by modifying some of these features. This paper proposes a multi-staged detection approach for Domain Generation Algorithm (DGA) using domain fluxing, Fast Flux Service Network (FFSN), and encrypted DNS tunneled-based botnets using BRO Network Security Monitor. This approach is able to detect DNS-tunneled botnet communications by analyzing different techniques used to find C&C servers, and also using signature matching technique to detect DNS-tunneled SSH handshake between bots and C&C servers.

Keyphrases: anomaly detection, botnet detection, domain generation algorithm, network security

In: Gordon Lee and Ying Jin (editors). Proceedings of 34th International Conference on Computers and Their Applications, vol 58, pages 137-143.

BibTeX entry
@inproceedings{CATA2019:Multi_Stage_Detection_Technique,
  author    = {Tirthankar Ghosh and Eman El-Sheikh and Wasseem Jammal},
  title     = {A Multi-Stage Detection Technique for DNS-Tunneled Botnets},
  booktitle = {Proceedings of 34th International Conference on Computers and Their Applications},
  editor    = {Gordon Lee and Ying Jin},
  series    = {EPiC Series in Computing},
  volume    = {58},
  publisher = {EasyChair},
  bibsource = {EasyChair, https://easychair.org},
  issn      = {2398-7340},
  url       = {/publications/paper/qnp1},
  doi       = {10.29007/c4wj},
  pages     = {137-143},
  year      = {2019}}
Download PDFOpen PDF in browser