Finding Fast Flux Traffic in DNS Haystack

2Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Fast-Flux (FF), a technique to associate hostname to multiple IP addresses, has been used by cybercriminals to hide their botnet server responsible for its anonymity and resiliency. The operation FF network service, often used for a phishing campaign and propagate malware to attack critical infrastructure, is quite similar to the operation of the Content Delivery Network (CDN) service, making it more challenging differentiating between the two services. In this research, the authors present a case study of how FF operate and can be detected in Internet Service Provider (ISP) network infrastructure, a high volume of DNS traffic was collected over the five months and analyzed by extracting several DNS features and feed into K-means clustering to distinguish between these two services. During the experiment, the authors show that utilizing web service content as one of the elements can differentiate between the two services with a purity value of 0.922.

Cite

CITATION STYLE

APA

Surjanto, W., & Lim, C. (2020). Finding Fast Flux Traffic in DNS Haystack. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 12332 LNCS, pp. 69–82). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-58295-1_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free