The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2015
DOI: 10.1080/19393555.2015.1058994
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Fast-flux Attacks

Abstract: Fast-flux" refers to rapidly assigning different IP addresses to the same domain name. Although there are some legitimate uses for this technique, recently it has become a favorite tool for cyber criminals to launch collaborative attacks. After it was first observed by Honeynet, it was reported that fast-flux has been used in phishing, malware spreading, spam, and other malicious activities linked to criminal organizations. Combining with peer-to-peer networking, distributed command and control, web-based load… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(14 citation statements)
references
References 45 publications
0
14
0
Order By: Relevance
“…2, an important question is whether there even is a saturation point for the visualized cumulative counts. While the plots allow to question whether the saturation was reached with q = 3000, the answer should still be negative; the counts should not grow without bound [7]. That is, the elaborated sampling bias should not be expected to tend to infinity.…”
Section: The Agility Biasmentioning
confidence: 99%
“…2, an important question is whether there even is a saturation point for the visualized cumulative counts. While the plots allow to question whether the saturation was reached with q = 3000, the answer should still be negative; the counts should not grow without bound [7]. That is, the elaborated sampling bias should not be expected to tend to infinity.…”
Section: The Agility Biasmentioning
confidence: 99%
“…A relevant metric for the detection of malicious fast flux is the number of IPs returned in a single A query. In particular, we consider the maximum m al of such value: a malicious fast flux is believed to typically have a m al larger than a legitimate fast flux [22,35].…”
Section: Metrics Identificationmentioning
confidence: 99%
“…Cumulative Number of Public Networks. Since the botnet underlying a malicious fast flux contains infected machines which are typically distributed quite randomly in different networks, the same is expected to be true for the IPs retrieved by the related queries [22,35]. For this reason a malicious fast flux typically has a number of public networks (n net ) larger than a legitimate CDN.…”
Section: Metrics Identificationmentioning
confidence: 99%
See 2 more Smart Citations