2016
DOI: 10.1145/2960409
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Accurate Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks

Abstract: In this article, we propose Segugio , a novel defense system that allows for efficiently tracking the occurrence of new malware-control domain names in very large ISP networks. Segugio passively monitors the DNS traffic to build a machine-domain bipartite graph representing who is querying what . After labeling nodes in this query behavior graph that are known to be either benign or malware-related, we propose a nov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
37
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(38 citation statements)
references
References 15 publications
1
37
0
Order By: Relevance
“…The numbers of malicious queries classified into clus- ters (1), (2), and (3) in Fig. 2 (c) were 1, 375, and 12, respectively.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The numbers of malicious queries classified into clus- ters (1), (2), and (3) in Fig. 2 (c) were 1, 375, and 12, respectively.…”
Section: Discussionmentioning
confidence: 99%
“…In cluster (2), queries related to domain reputation frequently occurred before and after the malicious queries, for example, to spamhaus.org, abuseat.org, and barracudacentral.org. Accordingly, we believe that the malicious queries in cluster (2) were caused by misdetection of communications from some security appliances. In cluster (3), queries to BitTorrent tracking sites occurred before and after the malicious queries, for example, to opentrackr.org, asnet.pw, and blackunicorn.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Rahbarinia et al [22] developed a system called Segugio that finds unknown malicious domains based on their cooccurrence relation with known malicious domains in DNS queries. Segugio is based on the following insights: (1) infected machines in the same malware family tend to communicate with the same malicious domain group and (2) uninfected machines have no reason to communicate with malicious domains.…”
Section: B Related Workmentioning
confidence: 99%
“…Consequently, these results suggest the proposed approach achieves a high level of effectiveness for datasets collected via campus networks. Table IX presents a qualitative comparison of the proposed approach and the ten previously published methods, which are representative examples of blacklist-based detection [13], DPI-based detection [18], reputation-based detection [21], behavior-based detection [22], [23], [24], ML-based detection [27], and DL-based detection [28], [29], [30]. In this comparison, we focus on the following five items: (1) DGA malware detection performance, (2) the ability to detect malware in real time, (3) robustness to encryption, (4) dependence on network scale, and (5) the need for training in advance using datasets or other prior knowledge.…”
Section: Identification Accuracy For Dns Queries Collected Via Cammentioning
confidence: 99%