Skip to main content

Detection of Algorithmically Generated Domain Names in Botnets

  • Conference paper
  • First Online:
Advanced Information Networking and Applications (AINA 2019)

Abstract

Botnets pose a major threat to the information security of organizations and individuals. The bots (malware infected hosts) receive commands and updates from the Command and Control (C&C) servers, and hence, contacting and communicating with these servers is an essential requirement of bots. However, once a malware is identified in the infected host, it is easy to find its C&C server and block it, if the domain names of the servers are hard-coded in the malware. To counter such detection, many malwares families use probabilistic algorithms known as domain generation algorithms (DGAs) to generate domain names for the C&C servers. This makes it difficult to track down the C&C servers of the Botnet even after the malware is identified. In this paper, we propose a probabilistic approach for the identification of domain names which are likely to be generated by a malware using DGA. The proposed solution is based on the hypothesis that human generated domain names are usually inspired by the words from a particular language (say English), whereas DGA generated domain names should contain random sub-strings in it. Results show that the percentage of false negatives in the detection of DGA generated domain names using the proposed method is less than 29% across 30 DGA families considered by us in our experimentation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C., Vigna, G.: Your botnet is my botnet: analysis of a botnet takeover. In: Security, pp. 635–647 (2009)

    Google Scholar 

  2. Barabosch, T., Wichmann, A., Leder, F., Gerhards-Padilla, E.: Automatic extraction of domain name generation algorithms from current malware

    Google Scholar 

  3. Panda Security: Pandalabs annual Report - 2015 summary (2016)

    Google Scholar 

  4. Yin, H., Song, D.: Panorama: capturing System-wise information flow for malware detection and analysis. In: CCS 2007, Alexandra, Virginia, USA, 29 November–2 November 2007 (2007)

    Google Scholar 

  5. Kolbitsch, C., Holz, T., Kruegel, C., Kirda, E.: Inspector gadget: automated extraction of proprietary gadgets from malware binaries. In: Security and Privacy, pp. 29–44 (2010)

    Google Scholar 

  6. Caballero, J., Johnson, N.M., Mccamant, S., Song, D.: Binary code extraction and interface identification for security applications. Electr. Eng. (2009)

    Google Scholar 

  7. Yadav, S., Reddy, A., Reddy, A.: Detecting algorithmically generated malicious domain names. In: IMC 2010 (2010)

    Google Scholar 

  8. Bilge, L., Kirda, E., Kruegel, C., Balduzzi, M., Antipolis, S.: Exposure: finding malicious domains using passive DNS analysis. In: 18th Annual Network and Distributed System Security Symposium, pp. 1–17 (2011)

    Google Scholar 

  9. Antonakakis, M., Perdisci, R., Dagon, D., Lee, W., Feamster, N.: Building a dynamic reputation system for DNS. In: Proceedings of the 19th Conference on Security, USENIX Security 2010, p. 18 (2010)

    Google Scholar 

  10. Burr, W., Dodson, D., Polk, W.: Electronic authentication guideline. NIST Special publication 800-63 (2004)

    Google Scholar 

  11. http://osint.banbenekconsulting.com

  12. Sharifnya, R., Abadi, M.: A novel reputation system to detect DGA-based botnets. In: Proceedings 2013 ANR (2013)

    Google Scholar 

  13. Yadav, S., Reddy, A.K.K., Reddy, A.L.N., Ranjan, S.: Detecting algorithmically generated domain-flux attacks with DNS traffic analysis. IEEE/ACM Trans. Netw. 20, 1663–1677 (2012)

    Article  Google Scholar 

  14. Li, R., Vitanyi, P.: An Introduction to Kolmogorov Complexity and Its Applications. Springer, Heidelberg (1997)

    Book  Google Scholar 

  15. Royal, P.: On the Kraken and Bobax botnets (2008). www.damballa.com/downloads/press/Kraken_Response.pdf. Accessed 06 Aug 2012

  16. Leder, F., Werner, T.: Know your enemy: containing conficker. The Honeynet Project (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashutosh Bhatia .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Vishvakarma, D.K., Bhatia, A., Riha, Z. (2020). Detection of Algorithmically Generated Domain Names in Botnets. In: Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2019. Advances in Intelligent Systems and Computing, vol 926. Springer, Cham. https://doi.org/10.1007/978-3-030-15032-7_107

Download citation

Publish with us

Policies and ethics