[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/EC2ND.2011.16guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

On Botnets That Use DNS for Command and Control

Published: 06 September 2011 Publication History

Abstract

We discovered and reverse engineered Feederbot, a botnet that uses DNS as carrier for its command and control. Using k-Means clustering and a Euclidean Distance based classifier, we correctly classified more than 14m DNS transactions of 42,143 malware samples concerning DNS-C&C usage, revealing another bot family with DNS C&C. In addition, we correctly detected DNS C&C in mixed office workstation network traffic.

Cited By

View all
  • (2022)Detecting Malicious Use of DoH Tunnels Using Statistical Traffic AnalysisProceedings of the 19th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks10.1145/3551663.3558605(25-32)Online publication date: 24-Oct-2022
  • (2020)A Statistical Approach to Detecting Low-Throughput Exfiltration through the Domain Name System ProtocolProceedings of the 2020 Workshop on DYnamic and Novel Advances in Machine Learning and Intelligent Cyber Security10.1145/3477997.3478007(1-10)Online publication date: 7-Dec-2020
  • (2019)A percolation-based recovery mechanism for bot infected P2P cloudProceedings of the 20th International Conference on Distributed Computing and Networking10.1145/3288599.3295597(474-479)Online publication date: 4-Jan-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
EC2ND '11: Proceedings of the 2011 Seventh European Conference on Computer Network Defense
September 2011
58 pages
ISBN:9780769547626

Publisher

IEEE Computer Society

United States

Publication History

Published: 06 September 2011

Author Tags

  1. botnet detection
  2. command and control
  3. dns
  4. malware detection

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 18 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Detecting Malicious Use of DoH Tunnels Using Statistical Traffic AnalysisProceedings of the 19th ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks10.1145/3551663.3558605(25-32)Online publication date: 24-Oct-2022
  • (2020)A Statistical Approach to Detecting Low-Throughput Exfiltration through the Domain Name System ProtocolProceedings of the 2020 Workshop on DYnamic and Novel Advances in Machine Learning and Intelligent Cyber Security10.1145/3477997.3478007(1-10)Online publication date: 7-Dec-2020
  • (2019)A percolation-based recovery mechanism for bot infected P2P cloudProceedings of the 20th International Conference on Distributed Computing and Networking10.1145/3288599.3295597(474-479)Online publication date: 4-Jan-2019
  • (2018)Internet freedom in West AfricaCommunications of the ACM10.1145/319947761:5(72-82)Online publication date: 24-Apr-2018
  • (2018)A Survey on Malicious Domains Detection through DNS Data AnalysisACM Computing Surveys10.1145/319132951:4(1-36)Online publication date: 6-Jul-2018
  • (2016)PREDATORProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security10.1145/2976749.2978317(1568-1579)Online publication date: 24-Oct-2016
  • (2016)Detection of Tunnels in PCAP Data by Random ForestsProceedings of the 11th Annual Cyber and Information Security Research Conference10.1145/2897795.2897804(1-4)Online publication date: 5-Apr-2016
  • (2016)New facets of mobile botnetInternational Journal of Information Security10.1007/s10207-015-0310-015:5(455-473)Online publication date: 1-Oct-2016
  • (2015)A Study on Botnets Utilizing DNSProceedings of the 4th Annual ACM Conference on Research in Information Technology10.1145/2808062.2808070(23-28)Online publication date: 29-Sep-2015
  • (2013)Resolvers RevealedACM Transactions on Internet Technology10.1145/2499926.249992812:4(1-17)Online publication date: 1-Jul-2013
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media