DocumentCode :
138420
Title :
Characterization of Covert Channels in DNS
Author :
Binsalleeh, Hamad ; Kara, A. Mert ; Youssef, Amira ; Debbabi, Mourad
Author_Institution :
Nat. Cyber Forensics & Training Alliance Canada, Montreal, QC, Canada
fYear :
2014
fDate :
March 30 2014-April 2 2014
Firstpage :
1
Lastpage :
5
Abstract :
Malware families utilize different protocols to establish their covert communication networks. It is also the case that sometimes they utilize protocols which are least expected to be used for transferring data, e.g., Domain Name System (DNS). Even though the DNS protocol is designed to be a translation service between domain names and IP addresses, it leaves some open doors to establish covert channels in DNS, which is widely known as DNS tunneling. In this paper, we characterize the malicious payload distribution channels in DNS. Our proposed solution characterizes these channels based on the DNS query and response messages patterns. We performed an extensive analysis of malware datasets for one year. Our experiments indicate that our system can successfully determine different patterns of the DNS traffic of malware families.
Keywords :
cryptographic protocols; invasive software; DNS protocol; DNS traffic; DNS tunneling; IP addresses; communication networks; covert channel characterization; domain name system; malicious payload distribution channels; malware datasets; malware families; message patterns; translation service; Command and control systems; Malware; Payloads; Protocols; Servers; Tunneling;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on
Conference_Location :
Dubai
Type :
conf
DOI :
10.1109/NTMS.2014.6814008
Filename :
6814008
Link To Document :
بازگشت