Technical gazette, Vol. 25 No. 2, 2018.
Original scientific paper
https://doi.org/10.17559/TV-20161012115204
Fast-Flux Botnet Detection Based on Traffic Response and Search Engines Credit Worthiness
Davor Cafuta
orcid.org/0000-0001-9105-6699
; Zagreb University of Applied Sciences, Vrbik 8, 10000 Zagreb, Croatia
Vlado Sruk
; Faculty of Electrical Engineering and Computing, University of Zagreb, Unska 3, 10000 Zagreb, Croatia
Ivica Dodig
orcid.org/0000-0002-3005-9949
; Zagreb University of Applied Sciences, Vrbik 8, 10000 Zagreb, Croatia
Abstract
Botnets are considered as the primary threats on the Internet and there have been many research efforts to detect and mitigate them. Today, Botnet uses a DNS technique fast-flux to hide malware sites behind a constantly changing network of compromised hosts. This technique is similar to trustworthy Round Robin DNS technique and Content Delivery Network (CDN). In order to distinguish the normal network traffic from Botnets different techniques are developed with more or less success. The aim of this paper is to improve Botnet detection using an Intrusion Detection System (IDS) or router. A novel classification method for online Botnet detection based on DNS traffic features that distinguish Botnet from CDN based traffic is presented. Botnet features are classified according to the possibility of usage and implementation in an embedded system. Traffic response is analysed as a strong candidate for online detection. Its disadvantage lies in specific areas where CDN acts as a Botnet. A new feature based on search engine hits is proposed to improve the false positive detection. The experimental evaluations show that proposed classification could significantly improve Botnet detection. A procedure is suggested to implement such a system as a part of IDS.
Keywords
Hrčak ID:
199135
URI
Publication date:
21.4.2018.
Visits: 2.484 *