2018
DOI: 10.1587/transcom.2017itp0009
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of DNS TXT Record Usage and Consideration of Botnet Communication Detection

Abstract: There have been several recent reports that botnet communication between bot-infected computers and Command and Control servers (C&C servers) using the Domain Name System (DNS) protocol has been used by many cyber attackers. In particular, botnet communication based on the DNS TXT record type has been observed in several kinds of botnet attack. Unfortunately, the DNS TXT record type has many forms of legitimate usage, such as hostname description. In this paper, in order to detect and block out botnet communic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

4
4

Authors

Journals

citations
Cited by 15 publications
(19 citation statements)
references
References 19 publications
0
17
0
Order By: Relevance
“…The authors of [33], [34] reported that many types of malware communicate through TXT-type queries. Therefore, we considered TXT-type queries in which the domain names matched blacklist entries to be malicious.…”
Section: B Classification Accuracymentioning
confidence: 99%
“…The authors of [33], [34] reported that many types of malware communicate through TXT-type queries. Therefore, we considered TXT-type queries in which the domain names matched blacklist entries to be malicious.…”
Section: B Classification Accuracymentioning
confidence: 99%
“…The authors of [14] reported that many types of malware communicate through TXT-type queries. Therefore, we considered TXT-type queries in which the domain names matched blacklist entries to be malicious.…”
Section: Discussionmentioning
confidence: 99%
“…For example, TXT records are used for various forms of email validation and spam prevention, including SPF, DKIM, and DMARC, but DNS TXT records can also be used as a way of finding contacts [4], or to monitor IoT devices [5]. Besides these legitimate use cases, malicious uses include adding large records to create more efficient DNS amplification attacks [6], or creating a command and control channel for malware [7], [8], [9], [10], [11], [12]. Most recently, spam campaigns have started to query DNS TXT records from JavaScript embedded in their HTML payload to dynamically redirect to target URLs [1].…”
Section: Background and Related Workmentioning
confidence: 99%