Title :
Leveraging client-side DNS failure patterns to identify malicious behaviors
Author :
Pengkui Luo;Ruben Torres; Zhi-Li Zhang;Sabyasachi Saha; Sung-Ju Lee;Antonio Nucci;Marco Mellia
Author_Institution :
University of Minnesota, USA
Abstract :
DNS has been increasingly abused by adversaries for cyber-attacks. Recent research has leveraged DNS failures (i.e. DNS queries that result in a Non-Existent-Domain response from the server) to identify malware activities, especially domain-flux botnets that generate many random domains as a rendezvous technique for command-&-control. Using ISP network traces, we conduct a systematic analysis of DNS failure characteristics, with the goal of uncovering how attackers exploit DNS for malicious activities. In addition to DNS failures generated by domain-flux bots, we discover many diverse and stealthy failure patterns that have received little attention. Based on these findings, we present a framework that detects diverse clusters of suspicious domain names that cause DNS failures, by considering multiple types of syntactic as well as temporal patterns. Our evolutionary learning framework evaluates the clusters produced over time to eliminate spurious cases while retaining sustaining (i.e., highly suspicious) clusters. One of the advantages of our framework is in analyzing DNS failures on per-client basis and not hinging on the existence of multiple clients infected by the same malware. Our evaluation on a large ISP network trace shows that our framework detects at least 97% of the clients with suspicious DNS behaviors, with over 81% precision.
Keywords :
"Servers","Syntactics","Malware","Electronic mail","Feature extraction","Clustering algorithms","Conferences"
Conference_Titel :
Communications and Network Security (CNS), 2015 IEEE Conference on
DOI :
10.1109/CNS.2015.7346852