2016 11th International Conference on Availability, Reliability and Security (ARES) 2016
DOI: 10.1109/ares.2016.16
|View full text |Cite
|
Sign up to set email alerts
|

Recognizing Time-Efficiently Local Botnet Infections - A Case Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…All things considered, Bilbo is the most reliable and competent model out there. Tanja et.al (Heuer et al, 2016) examined the use of machine learning on a small but reliable feature set to quickly and efficiently monitor and analyze DNS traffic passively. A regional ISP's entire DNS data stream is used for the evaluation and possible for medium-sized regional service providers to use typical DNS traffic to train classifiers and to implement systems based on the methodology presented here as an alternative to cloud services within the network of organizations.…”
Section: Related Workmentioning
confidence: 99%
“…All things considered, Bilbo is the most reliable and competent model out there. Tanja et.al (Heuer et al, 2016) examined the use of machine learning on a small but reliable feature set to quickly and efficiently monitor and analyze DNS traffic passively. A regional ISP's entire DNS data stream is used for the evaluation and possible for medium-sized regional service providers to use typical DNS traffic to train classifiers and to implement systems based on the methodology presented here as an alternative to cloud services within the network of organizations.…”
Section: Related Workmentioning
confidence: 99%
“…Provided with the general trend of this mechanism, recent works have focused on the analysis of DNS traffic to identify botnets relying on their DGAs. Various technologies have since been designed to detect DGA domains in DNS traffic, containing analyzing algorithmic models of domains, reverse-engineering malware instances [30,31], grouped into non-existent domains in DNS lookups [32,33], behavioral models [34,35], Social Network Analysis [36], power spectral density (PSD) analysis [37], and directly capturing C and C traffic [38,39]. However, influencing detected DGA domains to create a practical fix to botnet threats in large-scale networks is currently restricted.…”
Section: Dga-based Botnet Detectionmentioning
confidence: 99%