Sign In

Communications of the ACM

ACM TechNews

Prototype System Goes After Dns-Based Botnets

View as: Print Mobile App Share:

Technology Review

Researchers at the University of Georgia and the Georgia Institute of Technology have developed Pleiades, a prototype system that can better detect Domain Name Generation (DGA)-based botnets without the normal time-intensive reverse engineering required to find and defeat such malware.

"To automatically identify DGA domain names, Pleiades searches for relatively large clusters of NXDomains that have similar syntactic features, and are queried by multiple potentially compromised machines during a given epoch," the researchers say.

Pleiades can automatically identify and filter out accidental, user-generated NXDomains due to typos or misconfigurations. "When Pleiades finds a cluster of NXDomains, it applies statistical learning techniques to build a model of the DGA," the researchers say.

The researchers deployed and evaluated the Pleiades prototype in a large production Internet service provider network for 15 months and found 12 new DGA-based botnets. The researchers also note Pleiades has some constraints. For example, once a new DGA is discovered, Pleiades can build fairly precise statistical models of how the domains generated by the DGA "look like," but it cannot learn or rebuild the exact domain generation algorithm. As a result, Pleiades will generate some false positives and false negatives.

From Network World 
View Full Article

Abstracts Copyright © 2012 Information Inc., Bethesda, Maryland, USA 


No entries found

Sign In for Full Access
» Forgot Password? » Create an ACM Web Account