Detecting Network Anomalies In ISP Network Using DNS And NetFlow

Andreas Tedja, Charles Lim, Heru Purnomo Ipung
{"title":"Detecting Network Anomalies In ISP Network Using DNS And NetFlow","authors":"Andreas Tedja, Charles Lim, Heru Purnomo Ipung","doi":"10.33555/iconiet.v2i3.38","DOIUrl":null,"url":null,"abstract":"The Internet has become the biggest medium for people to communicate with otherpeople all around the world. However, the Internet is also home to hackers with maliciouspurposes. This poses a problem for Internet Service Providers (ISP) and its user, since it ispossible that their network is compromised and damages may be done. There are many types ofmalware that currently exist on the Internet. One of the growing type of malware is botnet.Botnet can infect a system and make it a zombie machine capable of doing distributed attacksunder the command of the botmaster. In order to make detection of botnet more difficult,botmasters often deploy fast flux. Fast flux will shuffle IP address of the domain of themalicious server, making tracking and detection much more difficult. However, there are stillnumerous ways to detect fast flux, one of them is by analysing DNS data. Domain Name System(DNS) is a crucial part of the Internet. DNS works by translating IP address to its associateddomain name. DNS are often being exploited by hackers to do its malicious activities. One ofthem is to deploy fast flux.Because the characteristics of fast flux is significantly different thannormal Internet traffic characteristics, it is possible to detect fast flux from normal Internettraffic from its DNS information. However, while detecting fast flux services, one must becautious since there are a few Internet services which have almost similar characteristics as fastflux service. This research manages to detect the existence of fast flux services in an ISPnetwork. The result is that fast flux mostly still has the same characteristics as found on previousresearches. However, current fast flux trend is to use cloud hosting services. The reason behindthis is that cloud hosting services tend to have better performance than typical zombie machine.Aside from this, it seems like there has been no specific measures taken by the hosting service toprevent this, making cloud hosting service the perfect medum for hosting botnet and fast fluxservices.","PeriodicalId":13150,"journal":{"name":"ICONIET PROCEEDING","volume":"57 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2019-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ICONIET PROCEEDING","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.33555/iconiet.v2i3.38","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The Internet has become the biggest medium for people to communicate with otherpeople all around the world. However, the Internet is also home to hackers with maliciouspurposes. This poses a problem for Internet Service Providers (ISP) and its user, since it ispossible that their network is compromised and damages may be done. There are many types ofmalware that currently exist on the Internet. One of the growing type of malware is botnet.Botnet can infect a system and make it a zombie machine capable of doing distributed attacksunder the command of the botmaster. In order to make detection of botnet more difficult,botmasters often deploy fast flux. Fast flux will shuffle IP address of the domain of themalicious server, making tracking and detection much more difficult. However, there are stillnumerous ways to detect fast flux, one of them is by analysing DNS data. Domain Name System(DNS) is a crucial part of the Internet. DNS works by translating IP address to its associateddomain name. DNS are often being exploited by hackers to do its malicious activities. One ofthem is to deploy fast flux.Because the characteristics of fast flux is significantly different thannormal Internet traffic characteristics, it is possible to detect fast flux from normal Internettraffic from its DNS information. However, while detecting fast flux services, one must becautious since there are a few Internet services which have almost similar characteristics as fastflux service. This research manages to detect the existence of fast flux services in an ISPnetwork. The result is that fast flux mostly still has the same characteristics as found on previousresearches. However, current fast flux trend is to use cloud hosting services. The reason behindthis is that cloud hosting services tend to have better performance than typical zombie machine.Aside from this, it seems like there has been no specific measures taken by the hosting service toprevent this, making cloud hosting service the perfect medum for hosting botnet and fast fluxservices.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用DNS和NetFlow检测ISP网络异常
互联网已经成为人们与世界各地的人交流的最大媒介。然而,互联网也是心怀恶意的黑客的家园。这给互联网服务提供商(ISP)和它的用户带来了一个问题,因为他们的网络有可能被破坏并造成损害。目前互联网上存在许多类型的恶意软件。僵尸网络是一种日益增长的恶意软件。僵尸网络可以感染系统,使其成为僵尸机器,能够在僵尸主机的命令下进行分布式攻击。为了提高僵尸网络的检测难度,僵尸管理员通常会部署快速流量。快速的流量会打乱恶意服务器所在域的IP地址,使跟踪和检测变得更加困难。然而,仍然有许多方法来检测快速流量,其中之一是通过分析DNS数据。域名系统(DNS)是互联网的重要组成部分。DNS的工作原理是将IP地址转换为与其关联的域名。DNS经常被黑客利用来进行恶意活动。其中之一是部署快速通量。由于快速流量的特征与正常互联网流量的特征有很大的不同,因此可以从正常互联网流量的DNS信息中检测出快速流量。然而,在检测快速流量服务时,必须谨慎,因为有一些互联网服务与快速流量服务具有几乎相似的特征。本研究设法检测ISPnetwork中是否存在快速流量服务。其结果是,快速通量大多仍然具有与以往研究相同的特征。然而,目前快速变化的趋势是使用云托管服务。这背后的原因是云托管服务往往比典型的僵尸机器有更好的性能。除此之外,托管服务似乎没有采取任何具体措施来防止这种情况,这使得云托管服务成为托管僵尸网络和快速流量服务的完美媒介。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Comparative study of Third Culture Individuals (TCI) and non-Third Culture Individuals in relation to Cultural Intelligence The Relationship between Working Environment and Internship Satisfaction Level: A Case Study Of A 4-Star Hotel Restaurant In Germany The Impact of Online Reviews and Ratings on Customer Hotel Preferences, Case Study: Tripadvisor Business Model Canvas Analysis and Development for Herry Furniture The Effect of Media Violence on Early Teens’ Hostility
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1