Detecting malware based on expired command-and-control traffic
In this article, we analyze the behavioral characteristics of domain name service queries produced by programs and then design an algorithm to detect malware with expired command-and-control domains based on the key feature of domain name service traffic, that is, repeatedly querying domain with a f...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
SAGE Publishing
2017-07-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1177/1550147717720791 |
id |
doaj-4ae26fe217ec42498bc37a11ec0322c8 |
---|---|
record_format |
Article |
spelling |
doaj-4ae26fe217ec42498bc37a11ec0322c82020-11-25T03:24:49ZengSAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772017-07-011310.1177/1550147717720791Detecting malware based on expired command-and-control trafficFutai Zou0Siyu Zhang1Linsen Li2Li Pan3Jianhua Li4School of Cyberspace Security, Shanghai Jiao Tong University, Shanghai, ChinaNetwork and Information Center, Shanghai Jiao Tong University, Shanghai, ChinaSchool of Cyberspace Security, Shanghai Jiao Tong University, Shanghai, ChinaSchool of Cyberspace Security, Shanghai Jiao Tong University, Shanghai, ChinaSchool of Cyberspace Security, Shanghai Jiao Tong University, Shanghai, ChinaIn this article, we analyze the behavioral characteristics of domain name service queries produced by programs and then design an algorithm to detect malware with expired command-and-control domains based on the key feature of domain name service traffic, that is, repeatedly querying domain with a fixed interval. In total, 3027 malware command-and-control domains in the network traffic of Shanghai Jiao Tong University, affecting 249 hosts, were successfully detected, with a high precision of 92.0%. This algorithm can find those malware with expired command-and-control domains that are usually ignored by current research and would have important value for eliminating network security risks and improving network security environment.https://doi.org/10.1177/1550147717720791 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Futai Zou Siyu Zhang Linsen Li Li Pan Jianhua Li |
spellingShingle |
Futai Zou Siyu Zhang Linsen Li Li Pan Jianhua Li Detecting malware based on expired command-and-control traffic International Journal of Distributed Sensor Networks |
author_facet |
Futai Zou Siyu Zhang Linsen Li Li Pan Jianhua Li |
author_sort |
Futai Zou |
title |
Detecting malware based on expired command-and-control traffic |
title_short |
Detecting malware based on expired command-and-control traffic |
title_full |
Detecting malware based on expired command-and-control traffic |
title_fullStr |
Detecting malware based on expired command-and-control traffic |
title_full_unstemmed |
Detecting malware based on expired command-and-control traffic |
title_sort |
detecting malware based on expired command-and-control traffic |
publisher |
SAGE Publishing |
series |
International Journal of Distributed Sensor Networks |
issn |
1550-1477 |
publishDate |
2017-07-01 |
description |
In this article, we analyze the behavioral characteristics of domain name service queries produced by programs and then design an algorithm to detect malware with expired command-and-control domains based on the key feature of domain name service traffic, that is, repeatedly querying domain with a fixed interval. In total, 3027 malware command-and-control domains in the network traffic of Shanghai Jiao Tong University, affecting 249 hosts, were successfully detected, with a high precision of 92.0%. This algorithm can find those malware with expired command-and-control domains that are usually ignored by current research and would have important value for eliminating network security risks and improving network security environment. |
url |
https://doi.org/10.1177/1550147717720791 |
work_keys_str_mv |
AT futaizou detectingmalwarebasedonexpiredcommandandcontroltraffic AT siyuzhang detectingmalwarebasedonexpiredcommandandcontroltraffic AT linsenli detectingmalwarebasedonexpiredcommandandcontroltraffic AT lipan detectingmalwarebasedonexpiredcommandandcontroltraffic AT jianhuali detectingmalwarebasedonexpiredcommandandcontroltraffic |
_version_ |
1724599650120368128 |