How to Achieve Early Botnet Detection at the Provider Level?

Christian Dietz, Anna Sperotto, G. Dreo, Aiko Pras

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    1 Citation (Scopus)
    136 Downloads (Pure)

    Abstract

    Botnets are an enabler for many cyber-criminal activities and often responsible for DDoS attacks, banking fraud, cyber-espionage and extortion. Botnets are controlled by a botmaster that uses various advanced techniques to create, maintain and hide their complex and distributed C&C infrastructures. First, they use P2P techniques and domain fast-flux to increase the resilience against take-down actions. Second, botnets encrypt their communication payload to prevent signature based detection. Both, the actions to increase the resilience and the prevention of signature based detection are counteractions against detection techniques. In contrast to existing approaches, our novel approach includes DNS registration behaviour, which we currently analyse for the .com, .net and .org domains, representing half of registered domains on the Internet. Hence, the goal of this PhD research is to enable early detection of the deployment and operation of botnets to facilitate proactive mitigation strategies, whereas current approaches usually detect botnets while these are already in active use. Consequently, this proactive approach prevents botnets to fully evolve their size and attack power. Moreover, as many end users are unable to detect and clean infected machines, our approach tackles the botnet phenomenon without requiring any end user involvement, by incorporating ISPs and domain name registrars. In addition, this will enable the discovery of similar behaviour of different connected systems, which allows detection in cases where bots are registered under domains that are not willing to cooperate.
    Original languageEnglish
    Title of host publicationProceedings of the 10th IFIP WG 6.6 International Conference on Management and Security in the Age of Hyperconnectivity, AIMS 2016
    Place of PublicationLondon
    PublisherSpringer
    Pages142-146
    Number of pages5
    ISBN (Print)978-3-319-39813-6
    DOIs
    Publication statusPublished - Jun 2016
    Event10th IFIP WG 6.6 International Conference on Management and Security in the Age of Hyperconnectivity, AIMS 2016 - Munich, Germany
    Duration: 20 Jun 201623 Jun 2016
    Conference number: 10

    Publication series

    NameLecture Notes in Computer Science
    PublisherSpringer Verlag
    Volume9701
    ISSN (Print)0302-9743

    Conference

    Conference10th IFIP WG 6.6 International Conference on Management and Security in the Age of Hyperconnectivity, AIMS 2016
    Abbreviated titleAIMS 2016
    CountryGermany
    CityMunich
    Period20/06/1623/06/16

      Fingerprint

    Keywords

    • Botnet
    • IP flow monitoring
    • Domain registration behaviour
    • DNS
    • Coordinated cyber threats
    • Early detection
    • EWI-27837
    • Provider network

    Cite this

    Dietz, C., Sperotto, A., Dreo, G., & Pras, A. (2016). How to Achieve Early Botnet Detection at the Provider Level? In Proceedings of the 10th IFIP WG 6.6 International Conference on Management and Security in the Age of Hyperconnectivity, AIMS 2016 (pp. 142-146). (Lecture Notes in Computer Science; Vol. 9701). London: Springer. https://doi.org/10.1007/978-3-319-39814-3_15