PsyBoG: A scalable botnet detection method for large-scale DNS traffic
- Authors
- Kwon, Jonghoon; Lee, Jehyun; Lee, Heejo; Perrig, Adrian
- Issue Date
- 14-3월-2016
- Publisher
- ELSEVIER SCIENCE BV
- Keywords
- Network security; Botnet detection; DNS analysis; Power spectral density; Group activity
- Citation
- COMPUTER NETWORKS, v.97, pp.48 - 73
- Indexed
- SCIE
SCOPUS
- Journal Title
- COMPUTER NETWORKS
- Volume
- 97
- Start Page
- 48
- End Page
- 73
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/89217
- DOI
- 10.1016/j.comnet.2015.12.008
- ISSN
- 1389-1286
- Abstract
- Domain Name System (DNS) traffic has become a rich source of information from a security perspective. However, the volume of DNS traffic has been skyrocketing, such that security analyzers experience difficulties in collecting, retrieving, and analyzing the DNS traffic in response to modern Internet threats. More precisely, much of the research relating to DNS has been negatively affected by the dramatic increase in the number of queries and domains. This phenomenon has necessitated a scalable approach, which is not dependent on the volume of DNS traffic. In this paper, we introduce a fast and scalable approach, called PsyBoG, for detecting malicious behavior within large volumes of DNS traffic. PsyBoG leverages a signal processing technique, power spectral density (PSD) analysis, to discover the major frequencies resulting from the periodic DNS queries of botnets. The PSD analysis allows us to detect sophisticated botnets regardless of their evasive techniques, sporadic behavior, and even normal users' traffic. Furthermore, our method allows us to deal with large-scale DNS data by only utilizing the timing information of query generation regardless of the number of queries and domains. Finally, PsyBoG discovers groups of hosts which show similar patterns of malicious behavior. PsyBoG was evaluated by conducting experiments with two different data sets, namely DNS traces generated by real maiware in controlled environments and a large number of real-world DNS traces collected from a recursive DNS server, an authoritative DNS server, and Top-Level Domain (TLD) servers. We utilized the maiware traces as the ground truth, and, as a result, PsyBoG performed with a detection accuracy of 95%. By using a large number of DNS traces, we were able to demonstrate the scalability and effectiveness of PsyBoG in terms of practical usage. Finally, PsyBoG detected 23 unknown and 26 known botnet groups with 0.1% false positives. (C) 2016 Elsevier B.V. All rights reserved.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - Graduate School > Department of Computer Science and Engineering > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.