Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2897845.2897877acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Discovering Malicious Domains through Passive DNS Data Graph Analysis

Published: 30 May 2016 Publication History

Abstract

Malicious domains are key components to a variety of cyber attacks. Several recent techniques are proposed to identify malicious domains through analysis of DNS data. The general approach is to build classifiers based on DNS-related local domain features. One potential problem is that many local features, e.g., domain name patterns and temporal patterns, tend to be not robust. Attackers could easily alter these features to evade detection without affecting much their attack capabilities. In this paper, we take a complementary approach. Instead of focusing on local features, we propose to discover and analyze global associations among domains. The key challenges are (1) to build meaningful associations among domains; and (2) to use these associations to reason about the potential maliciousness of domains. For the first challenge, we take advantage of the modus operandi of attackers. To avoid detection, malicious domains exhibit dynamic behavior by, for example, frequently changing the malicious domain-IP resolutions and creating new domains. This makes it very likely for attackers to reuse resources. It is indeed commonly observed that over a period of time multiple malicious domains are hosted on the same IPs and multiple IPs host the same malicious domains, which creates intrinsic association among them. For the second challenge, we develop a graph-based inference technique over associated domains. Our approach is based on the intuition that a domain having strong associations with known malicious domains is likely to be malicious. Carefully established associations enable the discovery of a large set of new malicious domains using a very small set of previously known malicious ones. Our experiments over a public passive DNS database show that the proposed technique can achieve high true positive rates (over 95%) while maintaining low false positive rates (less than 0.5%). Further, even with a small set of known malicious domains (a couple of hundreds), our technique can discover a large set of potential malicious domains (in the scale of up to tens of thousands).

References

[1]
M. Antonakakis, R. Perdisci, D. Dagon, W. Lee, and N. Feamster. Building a dynamic reputation system for DNS. In The 19th USENIX Security Symposium, Washington, 2010.
[2]
M. Antonakakis, R. Perdisci, Y. Nadji, N. V. II, S. Abu-Nimeh, W. Lee, and D. Dagon. From throw-away traffic to bots: Detecting the rise of dga-based malware. In The 21st USENIX Security Symposium, 2012.
[3]
L. Bilge, E. Kirda, C. Kruegel, and M. Balduzzi. EXPOSURE: finding malicious domains using passive DNS analysis. In The Network and Distributed System Security Symposium, 2011.
[4]
M. Cova, C. Leita, O. Thonnard, A. D. Keromytis, and M. Dacier. An analysis of rogue AV campaigns. In 13th International Symposium Recent Advances in Intrusion Detection, 2010.
[5]
H. Crawford and J. Aycock. Kwyjibo: automatic domain name generation. Softw., Pract. Exper., 38(14):1561--1567, 2008.
[6]
M. Feily, A. Shahrestani, and S. Ramadass. A survey of botnet and botnet detection. In The Third International Conference on Emerging Security Information, Systems and Technologies, 2009.
[7]
P. K. Manadhata, S. Yadav, P. Rao, and W. Horne. Detecting malicious domains via graph inference. In The 19th European Symposium on Research in Computer Security, 2014.
[8]
B. Rahbarinia, R. Perdisci, and M. Antonakakis. Segugio: Efficient behavior-based tracking of new malware-control domains in large isp networks. In The 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2015.
[9]
P. Royal. Quantifying maliciousness in alexa top-ranked domains, Dec. 2012.
[10]
S. Schiavoni, F. Maggi, L. Cavallaro, and S. Zanero. Phoenix: Dga-based botnet tracking and intelligence. In The 11th International Conference Detection of Intrusions and Malware, and Vulnerability Assessment, 2014.
[11]
R. Sherwood, S. Lee, and B. Bhattacharjee. Cooperative peer groups in NICE. Computer Networks, 50(4):523--544, 2006.
[12]
E. Stinson and J. C. Mitchell. Towards systematic evaluation of the evadability of bot/botnet detection methods. In The 2nd USENIX Workshop on Offensive Technologies, 2008.
[13]
A. Tamersoy, K. A. Roundy, and D. H. Chau. Guilt by association: large scale malware detection by mining file-relation graphs. In The 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014.
[14]
F. Weimer. Passive dns replication, Oct. 2007.
[15]
J. Zhang, S. Saha, G. Gu, S. Lee, and M. Mellia. Systematic mining of associated server herds for malware campaign discovery. In The 35th IEEE International Conference on Distributed Computing Systems. IEEE, 2015.

Cited By

View all
  • (2025)RMD-Graph: Adversarial Attacks Resisting Malicious Domain Detection Based on Dual DenoisingIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2024.352079837:3(1394-1410)Online publication date: Mar-2025
  • (2024)JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website DetectionJournal of Information Processing10.2197/ipsjjip.32.29832(298-307)Online publication date: 2024
  • (2024)LSMGraph: A High-Performance Dynamic Graph Storage System with Multi-Level CSRProceedings of the ACM on Management of Data10.1145/36988182:6(1-28)Online publication date: 20-Dec-2024
  • Show More Cited By

Index Terms

  1. Discovering Malicious Domains through Passive DNS Data Graph Analysis

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ASIA CCS '16: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security
    May 2016
    958 pages
    ISBN:9781450342339
    DOI:10.1145/2897845
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 30 May 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. malicious domains
    2. passive dns

    Qualifiers

    • Research-article

    Conference

    ASIA CCS '16
    Sponsor:

    Acceptance Rates

    ASIA CCS '16 Paper Acceptance Rate 73 of 350 submissions, 21%;
    Overall Acceptance Rate 418 of 2,322 submissions, 18%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)60
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 18 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)RMD-Graph: Adversarial Attacks Resisting Malicious Domain Detection Based on Dual DenoisingIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2024.352079837:3(1394-1410)Online publication date: Mar-2025
    • (2024)JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website DetectionJournal of Information Processing10.2197/ipsjjip.32.29832(298-307)Online publication date: 2024
    • (2024)LSMGraph: A High-Performance Dynamic Graph Storage System with Multi-Level CSRProceedings of the ACM on Management of Data10.1145/36988182:6(1-28)Online publication date: 20-Dec-2024
    • (2024)Practical Attacks Against DNS Reputation Systems2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00266(4516-4534)Online publication date: 19-May-2024
    • (2024)Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00006(1236-1254)Online publication date: 19-May-2024
    • (2024)CSR-PTDNG: A Graph Construction Method for DNS Tunneling Domain Names Detection2024 IEEE Symposium on Computers and Communications (ISCC)10.1109/ISCC61673.2024.10733579(1-7)Online publication date: 26-Jun-2024
    • (2024)An Elemental Decomposition of DNS Name-to-IP GraphsIEEE INFOCOM 2024 - IEEE Conference on Computer Communications10.1109/INFOCOM52122.2024.10621147(1661-1670)Online publication date: 20-May-2024
    • (2024)APT Attack and Detection Technology2024 IEEE 6th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)10.1109/IMCEC59810.2024.10575432(795-801)Online publication date: 24-May-2024
    • (2024)Augmenting DNS-Based Security with NetFlow2024 4th International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME)10.1109/ICECCME62383.2024.10797094(01-06)Online publication date: 4-Nov-2024
    • (2024)A Malicious Domain Detection Method Based on DNS Logs2024 4th International Conference on Blockchain Technology and Information Security (ICBCTIS)10.1109/ICBCTIS64495.2024.00051(283-288)Online publication date: 17-Aug-2024
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media