Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/DSN.2015.35guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Segugio: Efficient Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks

Published: 22 June 2015 Publication History

Abstract

In this paper, we propose Segugio, a novel defense system that allows for efficiently tracking the occurrence of new malware-control domain names in very large ISP networks. Segugio passively monitors the DNS traffic to build a machine-domain bipartite graph representing who is querying what. After labelling nodes in this query behavior graph that are known to be either benign or malware-related, we propose a novel approach to accurately detect previously unknown malware-control domains. We implemented a proof-of-concept version of Segugio and deployed it in large ISP networks that serve millions of users. Our experimental results show that Segugio can track the occurrence of new malware-control domains with up to 94% true positives (TPs) at less than 0.1% false positives (FPs). In addition, we provide the following results: (1) we show that Segugio can also detect control domains related to new, previously unseen malware families, with 85% TPs at 0.1% FPs, (2) Segugio's detection models learned on traffic from a given ISP network can be deployed into a different ISP network and still achieve very high detection accuracy, (3) new malware-control domains can be detected days or even weeks before they appear in a large commercial domain name blacklist, and (4) we show that Segugio clearly outperforms Notos, a previously proposed domain name reputation system.

Cited By

View all
  • (2021)Catching Transparent Phish: Analyzing and Detecting MITM Phishing ToolkitsProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3484765(36-50)Online publication date: 12-Nov-2021
  • (2020)MD-MinerPSecurity and Communication Networks10.1155/2020/88415442020Online publication date: 29-Oct-2020
  • (2019)Using Passive DNS to Detect Malicious Domain NameProceedings of the 3rd International Conference on Vision, Image and Signal Processing10.1145/3387168.3387236(1-8)Online publication date: 26-Aug-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
DSN '15: Proceedings of the 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
June 2015
573 pages
ISBN:9781479986293

Publisher

IEEE Computer Society

United States

Publication History

Published: 22 June 2015

Author Tags

  1. Behavioral Learning
  2. DNS
  3. Graph Learning
  4. Large-scale Data Analysis
  5. Malware-control Domains

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Catching Transparent Phish: Analyzing and Detecting MITM Phishing ToolkitsProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3484765(36-50)Online publication date: 12-Nov-2021
  • (2020)MD-MinerPSecurity and Communication Networks10.1155/2020/88415442020Online publication date: 29-Oct-2020
  • (2019)Using Passive DNS to Detect Malicious Domain NameProceedings of the 3rd International Conference on Vision, Image and Signal Processing10.1145/3387168.3387236(1-8)Online publication date: 26-Aug-2019
  • (2019)MalRankProceedings of the 35th Annual Computer Security Applications Conference10.1145/3359789.3359791(417-429)Online publication date: 9-Dec-2019
  • (2019)Co-Clustering Host-Domain Graphs to Discover Malware InfectionProceedings of the 2019 International Conference on Artificial Intelligence and Advanced Manufacturing10.1145/3358331.3358380(1-6)Online publication date: 17-Oct-2019
  • (2019)A Deep Learning Based Fast-Flux and CDN Domain Names Recognition MethodProceedings of the 2nd International Conference on Information Science and Systems10.1145/3322645.3322679(54-59)Online publication date: 16-Mar-2019
  • (2018)MADEProceedings of the 34th Annual Computer Security Applications Conference10.1145/3274694.3274710(124-136)Online publication date: 3-Dec-2018
  • (2018)A Survey on Malicious Domains Detection through DNS Data AnalysisACM Computing Surveys10.1145/319132951:4(1-36)Online publication date: 6-Jul-2018
  • (2018)A Domain is only as Good as its BuddiesProceedings of the Eighth ACM Conference on Data and Application Security and Privacy10.1145/3176258.3176329(330-341)Online publication date: 13-Mar-2018
  • (2018)DomainProfilerInternational Journal of Information Security10.1007/s10207-017-0396-717:6(661-680)Online publication date: 1-Nov-2018
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media