2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM) 2015
DOI: 10.1109/pacrim.2015.7334837
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of via-resolver DNS TXT queries and detection possibility of botnet communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
3
1

Relationship

3
6

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…3.3, indirect and direct outbound DNS TXT queries are used for botnet communication in various botnets. To detect botnet communication using indirect and direct outbound DNS TXT queries, it is important to distinguish between legitimate and suspicious usages of the † The results described in [1], [2] are different from this paper. This is because the experiment in [1], [2] was performed at Apr.…”
Section: Indirect/direct Outbound Dns Txt Query Analysismentioning
confidence: 83%
“…3.3, indirect and direct outbound DNS TXT queries are used for botnet communication in various botnets. To detect botnet communication using indirect and direct outbound DNS TXT queries, it is important to distinguish between legitimate and suspicious usages of the † The results described in [1], [2] are different from this paper. This is because the experiment in [1], [2] was performed at Apr.…”
Section: Indirect/direct Outbound Dns Txt Query Analysismentioning
confidence: 83%
“…The C&C Tracer [160] works by using C&C active behaviour feature extracting (CAFE), domain name status querying (DNSQ) and C&C status tracing analyser (CSTA) along with allow lists from multiple external sources such as the Honeypot project and Shadowserver Foundation. An analysis done by Ichise et al [156] to test the feasibility of botnet detection through domain name system (DNS) records. The analysis shows that in the 5.5 million DNS TXT record queries obtained from their campus network, around 2293 queries where classified as "unconfirmed".…”
Section: Domain Name System (Dns) Based Detectionmentioning
confidence: 99%
“…As being well-known, the DNS protocol is mainly used for domain name resolution which translates the hostnames to IP addresses in the Internet and vice versus. However, with the increase of Internet services, some minor DNS resource records like TXT records [6], [7] also become widely used nowadays. According to [6], [7] on the use of DNS TXT resource records, some types of bot programs have been identified as using DNS TXT resource records for botnet communication.…”
Section: Introductionmentioning
confidence: 99%
“…However, with the increase of Internet services, some minor DNS resource records like TXT records [6], [7] also become widely used nowadays. According to [6], [7] on the use of DNS TXT resource records, some types of bot programs have been identified as using DNS TXT resource records for botnet communication. In [8], [9], the authors proposed a machine-learning-based detection method of botnet communications using DNS over HTTPS protocol, which is a privacy enhancement of DNS.…”
Section: Introductionmentioning
confidence: 99%