A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing

Ahmad Al Nawasrah, Ammar Almomani, Samer H. Atawneh, Mohammad Alauthman
{"title":"A Survey of Fast Flux Botnet Detection With Fast Flux Cloud Computing","authors":"Ahmad Al Nawasrah, Ammar Almomani, Samer H. Atawneh, Mohammad Alauthman","doi":"10.4018/ijcac.2020070102","DOIUrl":null,"url":null,"abstract":"A botnet refers to a set of compromised machines controlled distantly by an attacker. Botnets are considered the basis of numerous security threats around the world. Command and control (C&C) servers are the backbone of botnet communications, in which bots send a report to the botmaster, and the latter sends attack orders to those bots. Botnets are also categorized according to their C&C protocols, such as internet relay chat (IRC) and peer-to-peer (P2P) botnets. A domain name system (DNS) method known as fast-flux is used by bot herders to cover malicious botnet activities and increase the lifetime of malicious servers by quickly changing the IP addresses of the domain names over time. Several methods have been suggested to detect fast-flux domains. However, these methods achieve low detection accuracy, especially for zero-day domains. They also entail a significantly long detection time and consume high memory storage. In this survey, we present an overview of the various techniques used to detect fast-flux domains according to solution scopes, namely, host-based, router-based, DNS-based, and cloud computing techniques. This survey provides an understanding of the problem, its current solution space, and the future research directions expected.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Cloud Appl. Comput.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/ijcac.2020070102","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

A botnet refers to a set of compromised machines controlled distantly by an attacker. Botnets are considered the basis of numerous security threats around the world. Command and control (C&C) servers are the backbone of botnet communications, in which bots send a report to the botmaster, and the latter sends attack orders to those bots. Botnets are also categorized according to their C&C protocols, such as internet relay chat (IRC) and peer-to-peer (P2P) botnets. A domain name system (DNS) method known as fast-flux is used by bot herders to cover malicious botnet activities and increase the lifetime of malicious servers by quickly changing the IP addresses of the domain names over time. Several methods have been suggested to detect fast-flux domains. However, these methods achieve low detection accuracy, especially for zero-day domains. They also entail a significantly long detection time and consume high memory storage. In this survey, we present an overview of the various techniques used to detect fast-flux domains according to solution scopes, namely, host-based, router-based, DNS-based, and cloud computing techniques. This survey provides an understanding of the problem, its current solution space, and the future research directions expected.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于快速通量云计算的快速通量僵尸网络检测研究
僵尸网络指的是一组被攻击者远程控制的受损机器。僵尸网络被认为是全球众多安全威胁的基础。命令和控制(C&C)服务器是僵尸网络通信的骨干,其中机器人向僵尸主机发送报告,后者向这些机器人发送攻击命令。僵尸网络还根据其C&C协议进行分类,例如互联网中继聊天(IRC)和点对点(P2P)僵尸网络。被称为快速通量的域名系统(DNS)方法被bot牧人使用,以覆盖恶意僵尸网络活动,并通过随着时间的推移快速更改域名的IP地址来增加恶意服务器的生命周期。提出了几种检测快通量域的方法。然而,这些方法的检测精度较低,特别是对于零日域。它们还需要很长的检测时间和消耗高内存存储。在本调查中,我们根据解决方案范围概述了用于检测快速通量域的各种技术,即基于主机的、基于路由器的、基于dns的和云计算技术。本调查提供了对问题的理解,目前的解决空间,以及未来的研究方向。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Mitigating Risks in the Cloud-Based Metaverse Access Control Strategies and Techniques Using Supervised Learning to Detect Command and Control Attacks in IoT System Level Benchmarking of Public Clouds A Secure Framework to Prevent Three-Tier Cloud Architecture From Malicious Malware Injection Attacks Sociocultural Factors in Times of Global Crisis
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1