DocumentCode :
1994049
Title :
Monitoring a fast flux botnet using recursive and passive DNS: A case study
Author :
Mahjoub, Dhia
Author_Institution :
Umbrella Security Labs., OpenDNS, San Francisco, CA, USA
fYear :
2013
fDate :
17-18 Sept. 2013
Firstpage :
1
Lastpage :
9
Abstract :
Fast flux, an evasion technique that has been around for years, continues to be widely used by cybercriminals today. In this case study, we describe a real-time monitoring and detection system that leverages recursive and passive DNS to track the Kelihos fast flux botnet. We track how the botnet grows its population of infected hosts, and detect, in real-time, the newest Kelihos fast flux domains that are being hosted by the botnet. Our analysis will present results on various components and attributes of the infrastructure leveraged by the Kelihos fast flux botnet. These include: domain TLD distribution, botnet geo-distribution, botnet daily cycles, distribution of operating systems used by the botnet machines, daily-discovered fast flux domains, domain and IP lifetime distribution, as well as specific examples of usage that highlight malicious campaigns.
Keywords :
Internet; computer network security; operating systems (computers); peer-to-peer computing; Botnet geo-distribution; Botnet machines; IP lifetime distribution; Kelihos fast flux Botnet; cybercriminals; daily-discovered fast flux domains; domain TLD distribution; fast flux Botnet monitoring; operating systems; passive DNS; real-time monitoring-detection system; recursive DNS; IP networks; Malware; Monitoring; Real-time systems; Sociology; Statistics; Kelihos; botnet; fast flux; passive DNS; real-time;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
eCrime Researchers Summit (eCRS), 2013
Conference_Location :
San Francisco, CA
Type :
conf
DOI :
10.1109/eCRS.2013.6805783
Filename :
6805783
Link To Document :
بازگشت