HOME > Detail View

Detail View

(A) scalable botnet countermeasure for large-scale DNS traffic

(A) scalable botnet countermeasure for large-scale DNS traffic

Material type
학위논문
Personal Author
권종훈 權鍾勳
Title Statement
(A) scalable botnet countermeasure for large-scale DNS traffic / Jonghoon Kwon
Publication, Distribution, etc
Seoul :   Graduate School, Korea University,   2016  
Physical Medium
x, 97장 : 도표 ; 26 cm
기타형태 저록
A Scalable Botnet Countermeasure for Large-scale DNS Traffic   (DCOLL211009)000000069531  
학위논문주기
학위논문(박사)-- 고려대학교 대학원: 컴퓨터·전파통신공학과, 2016. 8
학과코드
0510   6YD36   308  
General Note
지도교수: 李喜造  
Bibliography, Etc. Note
참고문헌: 장 91-97
이용가능한 다른형태자료
PDF 파일로도 이용가능;   Requires PDF file reader(application/pdf)  
비통제주제어
Network Security , Malware , Botnet , PSD , DGA,,
000 00000nam c2200205 c 4500
001 000045881644
005 20160926170210
007 ta
008 160708s2016 ulkd bmAC 000c eng
040 ▼a 211009 ▼c 211009 ▼d 211009
041 0 ▼a eng ▼b kor
085 0 ▼a 0510 ▼2 KDCP
090 ▼a 0510 ▼b 6YD36 ▼c 308
100 1 ▼a 권종훈 ▼g 權鍾勳
245 1 1 ▼a (A) scalable botnet countermeasure for large-scale DNS traffic / ▼d Jonghoon Kwon
260 ▼a Seoul : ▼b Graduate School, Korea University, ▼c 2016
300 ▼a x, 97장 : ▼b 도표 ; ▼c 26 cm
500 ▼a 지도교수: 李喜造
502 1 ▼a 학위논문(박사)-- ▼b 고려대학교 대학원: ▼c 컴퓨터·전파통신공학과, ▼d 2016. 8
504 ▼a 참고문헌: 장 91-97
530 ▼a PDF 파일로도 이용가능; ▼c Requires PDF file reader(application/pdf)
653 ▼a Network Security ▼a Malware ▼a Botnet ▼a PSD ▼a DGA
776 0 ▼t A Scalable Botnet Countermeasure for Large-scale DNS Traffic ▼w (DCOLL211009)000000069531
900 1 0 ▼a Kwon, Jong-hoon, ▼e
900 1 0 ▼a 이희조 ▼g 李喜造, ▼e 지도교수
945 ▼a KLPA

Electronic Information

No. Title Service
1
(A) scalable botnet countermeasure for large-scale DNS traffic (38회 열람)
View PDF Abstract Table of Contents

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Stacks(Thesis)/ Call Number 0510 6YD36 308 Accession No. 123054355 Availability Available Due Date Make a Reservation Service B M

Contents information

Abstract

Domain Name System (DNS) traffic has become a rich source of information from a security perspective. However, the volume of DNS traffic has been skyrocketing, such that security analyzers experience difficulties in collecting, retrieving, and analyzing the DNS traffic in response to modern Internet threats. More precisely, much of the research relating to DNS has been negatively affected by the dramatic increase in the number of queries and domains. This phenomenon has necessitated a scalable approach, which is independent of the volume of DNS traffic. In this thesis, we introduce a fast and scalable botnet countermeasure designed in two major perspectives: compromised host detection and malicious domain discovery.
The compromised botnet detection approach, called PsyBoG, leverages a signal processing technique, Power Spectral Density (PSD) analysis, to discover the major frequencies resulting from the periodic DNS queries of botnets. The PSD analysis allows us to detect sophisticated botnets regardless of their evasive techniques, sporadic behavior, and even normal users' traffic. Furthermore, our method allows us to deal with large-scale DNS data by only utilizing the timing information of query generation regardless of the number of queries and domains. Finally, PsyBoG discovers groups of hosts which show similar patterns of malicious behavior. For the malicious domain discovery, we introduce N+ropy which is a lightweight C&C domain detection algorithm using diversity analysis of queried NXdomains. First NXdomain groups are clustered depending on their domain name structures and shared domain names. Then we estimate how each member domain name is distinct, and finally we discover the resolved C&C domains by comparing them with DGA-generated NXdomain groups.
The experiments performed with two different data sets, namely DNS traces generated by real malware in controlled environments and a large number of real-world DNS traces collected from a recursive DNS server, an authoritative DNS server, and Top-Level Domain (TLD) servers. We utilized the malware traces as the ground truth, and, as a result, PsyBoG performed with a detection accuracy of 95%. By using a large number of DNS traces, we were able to demonstrate the scalability and effectiveness of PsyBoG in terms of practical usage. Finally, PsyBoG detected 23 unknown and 26 known botnet groups with 0.1% false positives. N+ropy scores 94.5 % precision and 100 % recall. Furthermore, it only requires less than 5 minutes for the 2 days long DNS traces containing 54 M of queries and 1 M of unique domain names.

Table of Contents

1. Introduction	1
1.1 Motivation	1
1.2 Approach	4
1.3 Contributions	5
1.4 Thesis Outline	6
2. Related Work and Background	7
2.1 Related Work	7
2.1.1 Host-based Detection	7
2.1.2 Network-based Detection	8
2.1.3 DNS-based Detection	9
2.2 Background	12
2.2.1 The Domain Name System (DNS)	12
2.2.2 Botnet Characteristics	15
2.2.3 Signal Processing Techniques	17
3. PsyBoG: Botnet Host Detection	19
3.1 Problem Definition	19
3.2 Insights on Botnet Behavior	21
3.3 PsyBoG Mechanism	22
3.3.1 DNS Traffic Collector	24
3.3.2 Periodicity Analyzer	26
3.3.3 Significant Peak Analyzer	28
3.3.4 Botnet Group Activity Detection	32
4. N+ropy: Malicious Domain Detection	35
4.1 Problem Definition	35
4.2 Insights on DGA botnet	36
4.3 N+ropy Mechanism	39
4.3.1 Domain Group Cluster	42
4.3.2 Diversity Analyzer	42
4.3.3 Resolved DGA Domain Tracker	45
5. Experiment Result I:  Botnet Host Detection	46
5.1 Dataset Overview	46
5.1.1 Filtering	48
5.1.2 Time Series	49
5.2 Detection Accuracy	49
5.3 Signal-to-Noise Test	55
5.4 Performance with Large-scale Data	56
5.4.1 Detection Performance in Real DNS	56
5.4.2 Botnet Group Detection	60
5.5 Scalability Analysis	62
5.6 Overhead Estimation	66
6. Experiment Result II:  Malicious Domain Detection	72
6.1 Dataset Description	72
6.2 Detection Performance Evaluation	74
6.3 System Performance Evaluation	78
7. Discussion	80
7.1 Random Query Pattern	80
7.2 Slow Query Pattern	82
7.3 Bot Hosts behind NAT boxes	82
7.4 More Efficient PsyBoG	83
8. Conclusion	85
Appendix A. Detection results for Campus1 and Campus2	86
Appendix B. Detection results for DDNS1 and DDNS2	88
Appendix C. Detection results for KrTLD1 and KrTLD2	89
Reference	91

New Arrivals Books in Related Fields