Abstract
We discovered and reverse engineered Feederbot, a botnet that uses DNS as carrier for its command and control. Using k-Means clustering and a Euclidean Distance based classifier, we correctly classified more than 14m DNS transactions of 42,143 malware samples concerning DNS-C&C usage, revealing another bot family with DNS C&C. In addition, we correctly detected DNS C&C in mixed office workstation network traffic.
Original language | English |
---|---|
Title of host publication | 2011 7th European Conference on Computer Network Defense, EC2ND 2011 |
Place of Publication | Piscataway |
Publisher | IEEE |
Pages | 9-16 |
Number of pages | 8 |
ISBN (Electronic) | 978-0-7695-4762-6 |
ISBN (Print) | 978-1-4673-2116-7 |
DOIs | |
Publication status | Published - 1 Dec 2012 |
Externally published | Yes |
Event | 7th European Conference on Computer Network Defense, EC2ND 2011 - Gothenburg, Sweden Duration: 6 Sept 2011 → 7 Sept 2011 Conference number: 7 |
Conference
Conference | 7th European Conference on Computer Network Defense, EC2ND 2011 |
---|---|
Abbreviated title | EC2ND 2011 |
Country/Territory | Sweden |
City | Gothenburg |
Period | 6/09/11 → 7/09/11 |
Keywords
- Botnet detection
- Command and control
- DNS
- Malware detection