2018
DOI: 10.1007/978-3-319-99136-8_25
|View full text |Cite
|
Sign up to set email alerts
|

Fast Flux Service Network Detection via Data Mining on Passive DNS Traffic

Abstract: In the last decade, the use of fast flux technique has become established as a common practice to organise botnets in Fast Flux Service Networks (FFSNs), which are platforms able to sustain illegal online services with very high availability. In this paper, we report on an effective fast flux detection algorithm based on the passive analysis of the Domain Name System (DNS) traffic of a corporate network. The proposed method is based on the near-real-time identification of different metrics that measure a wide … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2
2

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…Latest works in the area of DNS tunneling detection mainly cover three main categories, i.e., detection approaches via machine learning, real-time detection approaches, and detection of DNS tunneling variants (e.g., fast flux [9] and domain generation algorithms (DGAs) [8]).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Latest works in the area of DNS tunneling detection mainly cover three main categories, i.e., detection approaches via machine learning, real-time detection approaches, and detection of DNS tunneling variants (e.g., fast flux [9] and domain generation algorithms (DGAs) [8]).…”
Section: Related Workmentioning
confidence: 99%
“…Thus, by abusing legitimate network traffic protocols, like DNS [7], the attacker maximizes the time in which the infection remains undetected. In this work, we rely on a commercial network security monitoring platform for detecting and investigating potentially malicious or anomalous activities [8][9][10][11], but the proposed solution can be easily integrated into any network security monitoring platform able to provide network flow information along with its metadata. The platform we employ is responsible for collecting, processing network flows, and dispatching them to one or more advanced cybersecurity analytics (ACAs) which are able to recognize the signals of possible occurring attacks and anomalies.…”
Section: Introductionmentioning
confidence: 99%
“…By training Machine Learning models on large datasets of known FFSNs, researchers can develop models that can accurately detect FFSNs in real-time (Caglayan et al, 2009;Lombardo et al, 2018).…”
Section: State Of the Artmentioning
confidence: 99%
“…As an example, in Kitsune [113] rate from below 1% to over 95% while maintaining a low false positive rate (below 0.1%). The advantages of unsupervised ML methods make them suitable for commercial products: as an example, the method in [105] is used by Aizoon 11 to support botnet detection via DNS analyses, achieving less than 0.1% false positive rate. Our detailed case study in §7.1 presents the deployment of unsupervised ML used by Montimage to detect anomalous activities in a modern network.…”
Section: Machine Learning In Network Intrusion Detectionmentioning
confidence: 99%