Skip to main content

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 21))

Abstract

Botnet is one of the most threatening attacks recently. Web-based botnet attacks are serious, as hacker takes advantage of the HTTP connections hiding malicious transmissions in a vast amount of normal traffic that is not easily detectable. In addition, integrating with fast-flux domain technology, botnet may use a web server to issue attack commands and fast-flux technology to extend the lifespan of the malicious website. This study conducts anomalous flow analysis on web-based botnets and explores the effect of fast-flux domains. The proposed detection mechanism examines flow traffic and web domains to identify a botnet either using HTTP as control and command channel or using fast-flux domain for cloaking. Based on the experiments on both testbed and real network environments, the results prove that the proposed method can effectively identify these botnets.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gu, G., Zhang, J., Lee, W.: BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. In: Proc. 15th Annual Network and Distributed System Security Symposium (2008)

    Google Scholar 

  2. Polychronakis, M., Mavrommatis, P., Provos, N.: Ghost turns Zombie: Exploring the Life Cycle of Web-based Malware. In: Proc. 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats (2008)

    Google Scholar 

  3. Lee, J.S., Jeong, H.C., Park, J.H., Kim, M., Noh, B.N.: The Activity Analysis of Malicious HTTP-based Botnets using Degree of Periodic Repeatability. In: International Conference on Security Technology, SECTECH 2008, pp. 13–15 (2008)

    Google Scholar 

  4. Lakhina, A., Crovella, M., Diot, C.: Mining Anomalies Using Traffic Feature Distribution. In: Proc. 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, vol. 11(12), pp. 217–228 (2005)

    Google Scholar 

  5. Wang, K.M.: A Netflow Based Internet-worm Detecting System in Large Network. In: Third International Conference on Digital Information Management, ICDIM 2008, pp. 581–586 (2008)

    Google Scholar 

  6. Holz, T., Gorecki, C., Freiling, F., Rieck, K.: Measuring and Detecting of Fast-Flux Service Networks. In: Proc. 15th Annual Network & Distributed System Security Symposium (2008)

    Google Scholar 

  7. Zhou, C.A., Leckie, C., Karunasekera, S.: Collaborative Detection of Fast Flux Phishing Domains. Journal of Networks 4(1), 75–84 (2009)

    Article  Google Scholar 

  8. Passerini, E., Paleari, R., Martignoni, L., Bruschi, D.: FluXOR: Detecting and Monitoring Fast-Flux Service Networks. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 186–206. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  9. Yu, S., Zhou, S., Wang, S.: Fast Flux Attack Network Identification Based on Agent Lifespan. In: IEEE International Conference on Wireless Communications, Networking and Information Security, WCNIS 2010, pp. 658–662 (2010)

    Google Scholar 

  10. McAfee (2003), http://www.siteadvisor.com/

  11. SPAMHAUS (1998), http://www.spamhaus.org/lookup.lasso

  12. WOT (2010), http://www.mywot.com/

  13. Free PC Security (2007), http://www.freepcsecurity.co.uk/

  14. Testbed @ NCKU (2007), https://testbed.ncku.edu.tw

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chia-Mei Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, CM., Huang, MZ., Ou, YH. (2013). Detecting Web-Based Botnets with Fast-Flux Domains. In: Pan, JS., Yang, CN., Lin, CC. (eds) Advances in Intelligent Systems and Applications - Volume 2. Smart Innovation, Systems and Technologies, vol 21. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35473-1_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35473-1_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35472-4

  • Online ISBN: 978-3-642-35473-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics