2014
DOI: 10.1007/978-3-319-08509-8_11
|View full text |Cite
|
Sign up to set email alerts
|

Phoenix: DGA-Based Botnet Tracking and Intelligence

Abstract: Abstract. Modern botnets rely on domain-generation algorithms (DGAs) to build resilient command-and-control infrastructures. Given the prevalence of this mechanism, recent work has focused on the analysis of DNS traffic to recognize botnets based on their DGAs. While previous work has concentrated on detection, we focus on supporting intelligence operations. We propose Phoenix, a mechanism that, in addition to telling DGA-and non-DGA-generated domains apart using a combination of string and IP-based features, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
125
0
2

Year Published

2016
2016
2020
2020

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 152 publications
(133 citation statements)
references
References 12 publications
1
125
0
2
Order By: Relevance
“…Massive botnets use DGAs to build complicated C and C infrastructures for DDoS attacks. Schiavoni et al established an approach named Phoenix to identify the botnets relying on DGA utilizing IP-based traits [40], with the exception of distinguishing DGA-and non-DGA-generated domains utilizing a different combination of string and IP-based characteristics, and discovering representations of botnets from the clusters of DGA-generated domains. The Phoenix approach consisted of three modules: a detection module, a discovery module, and an intelligence and observation module.…”
Section: Dga-based Botnet Detectionmentioning
confidence: 99%
“…Massive botnets use DGAs to build complicated C and C infrastructures for DDoS attacks. Schiavoni et al established an approach named Phoenix to identify the botnets relying on DGA utilizing IP-based traits [40], with the exception of distinguishing DGA-and non-DGA-generated domains utilizing a different combination of string and IP-based characteristics, and discovering representations of botnets from the clusters of DGA-generated domains. The Phoenix approach consisted of three modules: a detection module, a discovery module, and an intelligence and observation module.…”
Section: Dga-based Botnet Detectionmentioning
confidence: 99%
“…Schiavoni et al [47] presented a mechanism called Phoenix based on the DBSCAN clustering algorithm, which could not only tell DGA-and non-DGA-generated domains apart using a combination of string and IPbased features, characterize the DGAs behind them, but also find group of DGA-generated domains that are representatives of the respective botnets.…”
Section: Dbscanmentioning
confidence: 99%
“…Yadav et al proposed a detection method for these domains that combined multiple metrics related to distributions of alphanumeric characters [11]. Schiavoni et al's method [12] for detecting DGA-based domain names utilizes a combination of dictionary-and n-gram-based approaches.…”
Section: Detection Of Automatically Generated Wordsmentioning
confidence: 99%