학술논문

Getting Prepared for the Next Botnet Attack : Detecting Algorithmically Generated Domains in Botnet Command and Control
Document Type
Conference
Source
2018 29th Irish Signals and Systems Conference (ISSC) Signals and Systems Conference (ISSC), 2018 29th Irish. :1-6 Jun, 2018
Subject
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Robotics and Control Systems
Signal Processing and Analysis
dga
machine learning
DNS
n-gram
botnet
C&C
actionable intelligence
big data security analytics
Language
Abstract
This paper highlights the high noise to signal ratio that DNS traffic poses to network defense’ incident detection and response, and the broader topic of the critical time component required from intrusion detection for actionable security intelligence. Nowhere is this truer than in the monitoring and interception of malware command and control communications hidden amongst benign DNS internet traffic. Global ransomware and malware families were responsible for over 5 billion USD in losses. In 4 days Reaper, a Mirai variant, infected 2.7m nodes. The scale of malware infections outstrips information security blacklisting ability to keep pace. Machine learning techniques, such as CLIP, provide the ability to detect malware traffic to malicious command and control domains with high reliability using lexical properties and semantic patterns in algorithmically generated domain names.