Analysis of Botnet Domain Names for IoT Cybersecurity

38Citations
Citations of this article
101Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Botnets are widespread nowadays with the expansion of the Internet and commonly occur in many cyber-attacks, resulting in serious threats to network services and users' properties. With the rapid development of the Internet of Things (IoT) applications, the botnet can easily make use of IoT devices for larger-scale attacks. Domain name system (DNS) is widely used by the botnet to establish the connection between bots and their corresponding command-and-control (CC). In order to avoid the track of the CC through the DNS information, some sophisticated schemes are used by the botnet and fast-flux is a typical one. In this paper, the activities of Rustock botnet domain names which just use the fast-flux as the connection method between bots and CC, are deeply analyzed from multiple aspects. Besides, we extract 32 special features of Rustock domain named querying traffic. Then multiple popular classifiers are adopted in order to pick the malicious domain names out from the DNS traffic using those 32 features. The work of this paper aims to provide guidance for future botnet detection based on real statics and experiments.

Cite

CITATION STYLE

APA

Li, W., Jin, J., & Lee, J. H. (2019). Analysis of Botnet Domain Names for IoT Cybersecurity. IEEE Access, 7, 94658–94665. https://doi.org/10.1109/ACCESS.2019.2927355

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free