Flow level data mining of DNS query streams for email worm detection

7Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Email worms remain a major network security concern, as they increasingly attack systems with intensity using more advanced social engineering tricks. Their extremely high prevalence clearly indicates that current network defence mechanisms are intrinsically incapable of mitigating email worms, and thereby reducing unwanted email traffic traversing the Internet. In this paper we study the effect email worms have on the flow-level characteristics of DNS query streams a user machine generates. We propose a method based on unsupervised learning and time series analysis to early detect email worms on the local name server, which is located topologically near the infected machine. We evaluate our method against an email worm DNS query stream dataset that consists of 68 email worm instances and show that it exhibits remarkable accuracy in detecting various email worm instances. © 2009 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Chatzis, N., & Popescu-Zeletin, R. (2009). Flow level data mining of DNS query streams for email worm detection. In Advances in Soft Computing (Vol. 53, pp. 186–194). https://doi.org/10.1007/978-3-540-88181-0_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free