Journal of Advances in Computer Engineering and Technology | |
Detecting Active Bot Networks Based on DNS Traffic Analysis | |
Zahra Nafarieh1  Ebrahim Mahdipur1  Haj Hamid Haj Seyed Javadi2  | |
[1] Department of Electrical and Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran.;Department of Mathematics and Computer Science, Shahed University, Tehran, Iran..; | |
关键词: bot networks; dns traffic analysis; fast flux; intrusion detection; network security; security threats; | |
DOI : | |
来源: DOAJ |
【 摘 要 】
Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential for the proper functioning of the network, it is very useful for monitoring, detecting and reducing the activity of the Botnets. DNS queries are sent in the early stages of the life cycle of each Botnet, so infected hosts are identified before any malicious activity is performed. Because the exchange of information in the network environment and the volume of information is very high, Storing and indexing this massive data requires a large database. By using the DNS traffic analysis, we try to identify the Botnets. We used the data generated from the network traffic and information of known Botnets with the Splunk platform to conduct data analysis to quickly identify attacks and predict potential dangers that could arise. The analysis results were used in tests conducted on real network environments to determine the types of attacks. Visual IP mapping was then used to determine actions that could be taken. The proposed method is capable of recognizing known and unknown Bots.
【 授权许可】
Unknown