2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applicati 2015
DOI: 10.1109/idaacs.2015.7340777
|View full text |Cite
|
Sign up to set email alerts
|

DNS-based anti-evasion technique for botnets detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…Table 4 compares the detection percentage and the FP of the proposed method with the other articles in the field botnet detection [3,4,7,14,[25][26][27][28].…”
Section: Results Of the Implementation Of Final Benchmark Ementioning
confidence: 99%
“…Table 4 compares the detection percentage and the FP of the proposed method with the other articles in the field botnet detection [3,4,7,14,[25][26][27][28].…”
Section: Results Of the Implementation Of Final Benchmark Ementioning
confidence: 99%
“…Presented system was developed from the idea to detect the botnets' attacks using the multi-agent system [21]. The next generations of the BotGRABBER system have obtained the possibility to detect the botnets that use DNS evasion techniques (cycling of IP mapping, "domain flux", "fast flux" and DNS-tunneling) via DNS traffic analysis, and the possibility to analyze the software's behavior in the host, which may indicate the possible presence of bot directly in the host [22][23][24].…”
Section: Results and Analysismentioning
confidence: 99%
“…2) DNS-based approaches: based on the fact that bots may launch DNS queries to detect and access the C&C server, DNS monitoring is used as an efficient manner to detect botnet [5]- [12]. However, these past works mainly focus on monitor-based traffic features related with botnet.…”
Section: Related Workmentioning
confidence: 99%
“…After the data have been divided, it is possible to work on the development of the classification algorithm. We will not compare the related works here [5]- [12] because the most important motivation of this work is to deeply and comprehensively analyze the botnet domain name characteristics. Then we adopt different classifiers based on our refined features to verify that the features are effective and niche targeting in order to detect the botnet domain name even under different classifiers.…”
Section: Botnet Domain Name Detectionmentioning
confidence: 99%