University of Illinois Chicago
Browse

Finding, Characterizing and Tracking Domain Generation Algorithms from Passive DNS Monitoring

Download (2.84 MB)
thesis
posted on 2015-10-25, 00:00 authored by Stefano Schiavoni
A botnet is a network of compromised machines (bots) under the control a an entity (the botmaster), which uses them to perform illegal activities. Modern botnets rely on domain generation algorithms (DGAs) to build resilient command-and-control (C&C) infrastructures. Recently, researchers proposed approaches to recognize automatically-generated domains from domain name system (DNS) traffic to infiltrate into such C&C infrastructures and cause the masters to lose control of their bots. Unfortunately, such approaches require access to DNS sensors whose deployment poses practical issues that render their adoption problematic. Instead, we propose a novel way to combine publicly-available and privacy-preserving databases of historical DNS traffic together with linguistic-based models of the suspicious domains. From this, we find automatically-generated domain names, characterize the generation algorithms, isolate logical groups of domains that represent the respective botnets, and produce novel knowledge about the evolving behavior of each tracked botnet. We evaluated our approach on millions of real-world domains. Overall, it correctly flags 81.4 to 94.8% of the domains as being automatically generated. More important, it isolates families of domains that belong to different DGAs. We were also able to verify the validity of our findings against live botnets (e.g., Conficker.B).

History

Advisor

Venkatakrishnan, V.N.

Department

Computer Science

Degree Grantor

University of Illinois at Chicago

Degree Level

  • Masters

Committee Member

Eriksson, Jakob Zanero, Stefano

Submitted date

2013-08

Language

  • en

Issue date

2013-10-24

Usage metrics

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC