DOI: 10.29007/c4wj
|View full text |Cite
|
Sign up to set email alerts
|

A Multi-Stage Detection Technique for DNS-Tunneled Botnets

Abstract: Botnet communications are obfuscated within legitimate network protocols to avoid detection and remediation. Domain Name Service (DNS) is a protocol of choice to hide communication with Command & Control (C&C) servers, where botmasters tunnel these communications within DNS request and response. Since botnet communications are characterized by different features, botmasters may evade detection methods by modifying some of these features. This paper proposes a multi-staged detection approach for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…Statistical analysis could detect "silent" state bots. e literature [116] proposed a multistage detection method for domain fluxing, fast-flux service network (FFSN), and domain generation algorithm (DGA). e first stage used NX domain and server failure errors to detect DNS tunnel C&C server calls.…”
Section: Combination Methodmentioning
confidence: 99%
“…Statistical analysis could detect "silent" state bots. e literature [116] proposed a multistage detection method for domain fluxing, fast-flux service network (FFSN), and domain generation algorithm (DGA). e first stage used NX domain and server failure errors to detect DNS tunnel C&C server calls.…”
Section: Combination Methodmentioning
confidence: 99%