SlideShare a Scribd company logo
Early Detection of Malicious Flux Networks
via Large Scale Passive DNS Traffic Analysis.
FluxBuster
Presented By
Rajshekhar PATIL
•Introduction
•Research goals
•Flux buster
•Cross validation
•Safe browser
•Conclusion
•References
Contents
Introduction
 Nowadays, internet miscreant and cyber criminals are increasing a
lot and detecting and stopping them has become a serious issue.
 Malicious flux networks have recently started to thrive. Malicious flux
-networks are a type a illegitimate content delivery networks(CDNs).
 These types of networks are set up using fast flux domain names i.e., the
set of resolved IP addresses associated to these networks change frequently,
often after each DNS query, thereby making it difficult to detect them.
 To make it even more complicated, these set of resolved set of IP addresses,
also known as flux agents, are spread across many different networks.
 FluxBuster is based on DNS traffic observation from ”above” .
Research Goals
• Previous works on flux detection based mainly on active probing
– Limited to known bad or suspicious domains
– Domains treated independently
– Possible data pollution by attackers
• Passive Detection
– Monitor “behavior” of all domains over time
– Only focus on live domains
FluxBuster System Overview
DNS Message Aggregator
Flux Buster receives in input a stream of DNS messages as provided by the
ISC/SIE framework.ISC/SIE collects raw DNS query/response messages
from a large number of RDNS sensors, and rebroadcasts these DNS
messages in a deduplicated fashion.
For example, assume that there are three RDNS sensors S1, S2, and
S3 that have reported a DNS query/response message regarding a
domain name d to ISC/SIE. Suppose that S1 reported the mapping of
domain d to three IP addresses, { IP1, IP2, IP3}, S2 reported the
mapping of d to two addresses {IP1, IP4}, and S3 reported the mapping
of d to one address {IP5}.
 These raw messages will be combined within the ISC/SIE framework
into a deduplicated message starting that d maps to {IP1, IP2, IP3,
IP4, IP5}.
Characteristics of Flux Domain Names
1. short time-to-live;
2. high frequency of change of the set of resolved IPs (i.e., the flux agents)
returned at each query;
3. the overall set of resolved IPs obtained by querying the same
domain name over time is often very large;
4. the resolved IPs are scattered across many different networks.
Message Prefiltering
The Message Prefiltering module performs data volume reduction by
discarding domain names that are very unlikely to be part of a flux
network.
Therefore only domains with a very large TTL, very low number of resolved
Ips and a low value of diversity of the IP set will be discarded.
Summing up, the output of the Message Prefiltering module is a list of
candidate flux domains and their related aggregated DNS information
(i.e., resolved IP addresses, average TTL, etc.).
Domain Clustering
 Group domains that are related to each other
– Hierarchical clustering algorithm
– Similarity measure based on resolved IPs
perform domain clustering of flux domains that are related to each
other single-linkage hierarchical clustering algorithm is used, which
adopts a friends of friends clustering strategy.
In order to apply the clustering algorithm to a set of domain
names D ={d1, d2, . . . , dn},a measure of similarity between them
is defined first.
Given two domains α and β, and their cumulative set of resolved IP
addresses collected during an epoch E, respectively, Rand R, compute
their similarity score as
|R∩R| 1
——— · ——————————— €
|R∪R| 1+ eγ−min(|R|,|R|)
Sim(α, β) =
Jaccard Index
ǫ[0, 1]
The first factor is the Jaccard index for sets R and R, which intuitively
measures the relative overlap between the two cumulative sets of
resolved IPs.
The second factor is a sigmoidal weight designed to measure the
confidence in estimating the Jaccard index.
Supervised Classifier
 Input : Clusters of domains
– Clusters are translated into feature vectors
Supervised Training:
– Need labeled data(ground truth)
– We built a web interface to facilitate semi-manual labeling
Output : new (unlabeled) clusters are Labeled as
either Flux or non--‐flux
Cross-Validation
• Label data Dataset
– semi--‐manual labeling process
– If no clear-cut decision exclude Cluster To minimize
training noise
– 1,337 clusters labeled as flux
• 100,644 distinct 2LDs(113,580FQDs)
– 5,708 labeled as non-flux
• 2,116 distinct 2LDs(59,215 FQDs)
Safe Browsing
• Take flux domains and
– Check if port 80 is open
– Check for valid HTTP response/content
– Vet against Safe Browsing (SB) and malware BLs
• Most missed by SB are Rogue pharmacies, adult-related sites
• SB Only reports Known phishing And malware sites
Conclusion
The above evaluation showed that Flux Buster is capable of
accurately detecting previously unknown flux networks days or even
weeks in advanced before they appear in public blacklists.
The experimental results show that FluxBuster is able to accurately
detect malicious flux networks with a low false positive rate.
our detection approach is not limited to the analysis of suspicious domain
names extracted from spam emails or precompiled domain blacklists.
REFERENCE
[1] Roberto Perdisci, Igino Corona, and Giorgio Giacinto.
Early Detection of Malicious Flux Networks via Large-
Scale Passive DNS Traffic Analysis. In IEEE Transactions
on Dependable and Secure Computing, VOL. 9, NO. 5,
September/October 2012.
[2] M. Knysz, X. Hu, and K.G. Shin.Good Guys vs. Bot
Guise: Mimicry Attacks against Fast Flux Detection
Systems.In Proc. IEEE INFOCOM, 2011.
Early Detection of Malicious Flux Networks via Large Scale Passive DNS Traffic Analysis

More Related Content

PPTX
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
PPTX
Angler talk
PDF
Fast Detection of New Malicious Domains using DNS
PDF
Cryptolocker Webcast
PDF
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
PDF
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
PDF
Dns tunnelling its all in the name
PDF
Defcon
Infrastructure Tracking with Passive Monitoring and Active Probing: ShmooCon ...
Angler talk
Fast Detection of New Malicious Domains using DNS
Cryptolocker Webcast
New DNS Traffic Analysis Techniques to Identify Global Internet Threats
Using Algorithms to Brute Force Algorithms...A Journey Through Time and Names...
Dns tunnelling its all in the name
Defcon

What's hot (20)

PDF
Early Detection of Malicious Activity—How Well Do You Know Your DNS?
PDF
End-to-End Analysis of a Domain Generating Algorithm Malware Family
PDF
Ariu - Ph.D. Defense Slides
PPTX
Tcpdump hunter
PPTX
DNS Exfiltration and Out-of-bound attacks
PPTX
Hiding in plain sight
PDF
BlueHat v17 || 28 Registrations Later: Measuring the Exploitation of Residual...
PDF
Extending Zeek for ICS Defense
PDF
(130511) #fitalk network forensics and its role and scope
PDF
Class Project Showcase: DNS Spoofing
PPT
Malware Analysis Made Simple
PPTX
Network based file carving
PPTX
Detecting Malicious SSL Certificates Using Bro
PDF
Malicious Domain Profiling
PDF
'Malware Analysis' by PP Singh
PDF
DNS Security
PDF
HSB - Secure DNS en BGP ontwikkelingen - Benno Overeinder
PPTX
Network And Application Layer Attacks
PDF
DEF CON 27 - MAKSIM SHUDRAK - zero bugs found hold my beer afl how to improve...
Early Detection of Malicious Activity—How Well Do You Know Your DNS?
End-to-End Analysis of a Domain Generating Algorithm Malware Family
Ariu - Ph.D. Defense Slides
Tcpdump hunter
DNS Exfiltration and Out-of-bound attacks
Hiding in plain sight
BlueHat v17 || 28 Registrations Later: Measuring the Exploitation of Residual...
Extending Zeek for ICS Defense
(130511) #fitalk network forensics and its role and scope
Class Project Showcase: DNS Spoofing
Malware Analysis Made Simple
Network based file carving
Detecting Malicious SSL Certificates Using Bro
Malicious Domain Profiling
'Malware Analysis' by PP Singh
DNS Security
HSB - Secure DNS en BGP ontwikkelingen - Benno Overeinder
Network And Application Layer Attacks
DEF CON 27 - MAKSIM SHUDRAK - zero bugs found hold my beer afl how to improve...
Ad

Viewers also liked (20)

DOCX
BULK IEEE 2014-15 PROJECTS LIST FOR NS2
PPTX
Stock market prediction technique:
PDF
Botconf 2013 - DNS-based Botnet C2 Server Detection
PPTX
Fast flux
PDF
Fast flux hosting and DNS
PDF
OpenDNS Whitepaper: DNS's Role in Botnet C&C
PPTX
Analysing of big data using map reduce
PPTX
DNS for Developers - NDC Oslo 2016
PPTX
The DNS Tunneling Blindspot
PPTX
Dns security threats and solutions
PDF
Dns security
PPTX
Network tunneling techniques
PPTX
DNS Security
PPT
Social media & cyber crime
PDF
Let's Lean and Implement flux
PDF
CNIT 40: 1: The Importance of DNS Security
PDF
Social Media & Crime
DOCX
Artificial intelligence report
PPTX
DNS Security Presentation ISSA
BULK IEEE 2014-15 PROJECTS LIST FOR NS2
Stock market prediction technique:
Botconf 2013 - DNS-based Botnet C2 Server Detection
Fast flux
Fast flux hosting and DNS
OpenDNS Whitepaper: DNS's Role in Botnet C&C
Analysing of big data using map reduce
DNS for Developers - NDC Oslo 2016
The DNS Tunneling Blindspot
Dns security threats and solutions
Dns security
Network tunneling techniques
DNS Security
Social media & cyber crime
Let's Lean and Implement flux
CNIT 40: 1: The Importance of DNS Security
Social Media & Crime
Artificial intelligence report
DNS Security Presentation ISSA
Ad

Similar to Early Detection of Malicious Flux Networks via Large Scale Passive DNS Traffic Analysis (20)

PPT
2011 1028
PDF
network-security-arch Firewall Access Control.pdf
PDF
CNIT 40: 4: Monitoring and detecting security breaches
DOCX
For your final step, you will synthesize the previous steps and la
PPTX
Learning series fundamentals of Networking and Medical Imaging
PPT
cyber forensics-enum,sniffing,malware threat.ppt
PDF
Multi-Layer DDoS Mitigation Strategies
PPTX
Packet Analysis - Course Technology Computing Conference
PPTX
DHCP and DNS protocols Presentation2.pptx
PDF
Wireshark Tutorial, Wireshark Tutorial, Wireshark Tutorial
PPTX
DNS - MCSE 2019
PPTX
Demystifying SharePoint Infrastructure – for NON-IT People
PPT
emp-internet07.ppt
PPT
CCNA 1
PPTX
Presentacion QoS.pptx
PPT
CS10NETWOKSecurityhdhgsfdhsdheahgqergd.ppt
PPT
Networking Study Guide
PPT
Network forensics1
PPT
network-security_for cybersecurity_experts
PDF
DDoS Threat Landscape - Ron Winward CHINOG16
2011 1028
network-security-arch Firewall Access Control.pdf
CNIT 40: 4: Monitoring and detecting security breaches
For your final step, you will synthesize the previous steps and la
Learning series fundamentals of Networking and Medical Imaging
cyber forensics-enum,sniffing,malware threat.ppt
Multi-Layer DDoS Mitigation Strategies
Packet Analysis - Course Technology Computing Conference
DHCP and DNS protocols Presentation2.pptx
Wireshark Tutorial, Wireshark Tutorial, Wireshark Tutorial
DNS - MCSE 2019
Demystifying SharePoint Infrastructure – for NON-IT People
emp-internet07.ppt
CCNA 1
Presentacion QoS.pptx
CS10NETWOKSecurityhdhgsfdhsdheahgqergd.ppt
Networking Study Guide
Network forensics1
network-security_for cybersecurity_experts
DDoS Threat Landscape - Ron Winward CHINOG16

Recently uploaded (20)

PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Pharma ospi slides which help in ospi learning
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Pre independence Education in Inndia.pdf
PPTX
Institutional Correction lecture only . . .
PDF
Sports Quiz easy sports quiz sports quiz
PDF
Insiders guide to clinical Medicine.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Complications of Minimal Access Surgery at WLH
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Anesthesia in Laparoscopic Surgery in India
Pharma ospi slides which help in ospi learning
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Pre independence Education in Inndia.pdf
Institutional Correction lecture only . . .
Sports Quiz easy sports quiz sports quiz
Insiders guide to clinical Medicine.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Complications of Minimal Access Surgery at WLH
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
STATICS OF THE RIGID BODIES Hibbelers.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Cell Types and Its function , kingdom of life
Abdominal Access Techniques with Prof. Dr. R K Mishra
102 student loan defaulters named and shamed – Is someone you know on the list?
Microbial disease of the cardiovascular and lymphatic systems
O5-L3 Freight Transport Ops (International) V1.pdf

Early Detection of Malicious Flux Networks via Large Scale Passive DNS Traffic Analysis

  • 1. Early Detection of Malicious Flux Networks via Large Scale Passive DNS Traffic Analysis. FluxBuster Presented By Rajshekhar PATIL
  • 2. •Introduction •Research goals •Flux buster •Cross validation •Safe browser •Conclusion •References Contents
  • 3. Introduction  Nowadays, internet miscreant and cyber criminals are increasing a lot and detecting and stopping them has become a serious issue.  Malicious flux networks have recently started to thrive. Malicious flux -networks are a type a illegitimate content delivery networks(CDNs).  These types of networks are set up using fast flux domain names i.e., the set of resolved IP addresses associated to these networks change frequently, often after each DNS query, thereby making it difficult to detect them.  To make it even more complicated, these set of resolved set of IP addresses, also known as flux agents, are spread across many different networks.  FluxBuster is based on DNS traffic observation from ”above” .
  • 4. Research Goals • Previous works on flux detection based mainly on active probing – Limited to known bad or suspicious domains – Domains treated independently – Possible data pollution by attackers • Passive Detection – Monitor “behavior” of all domains over time – Only focus on live domains
  • 6. DNS Message Aggregator Flux Buster receives in input a stream of DNS messages as provided by the ISC/SIE framework.ISC/SIE collects raw DNS query/response messages from a large number of RDNS sensors, and rebroadcasts these DNS messages in a deduplicated fashion. For example, assume that there are three RDNS sensors S1, S2, and S3 that have reported a DNS query/response message regarding a domain name d to ISC/SIE. Suppose that S1 reported the mapping of domain d to three IP addresses, { IP1, IP2, IP3}, S2 reported the mapping of d to two addresses {IP1, IP4}, and S3 reported the mapping of d to one address {IP5}.  These raw messages will be combined within the ISC/SIE framework into a deduplicated message starting that d maps to {IP1, IP2, IP3, IP4, IP5}.
  • 7. Characteristics of Flux Domain Names 1. short time-to-live; 2. high frequency of change of the set of resolved IPs (i.e., the flux agents) returned at each query; 3. the overall set of resolved IPs obtained by querying the same domain name over time is often very large; 4. the resolved IPs are scattered across many different networks.
  • 8. Message Prefiltering The Message Prefiltering module performs data volume reduction by discarding domain names that are very unlikely to be part of a flux network. Therefore only domains with a very large TTL, very low number of resolved Ips and a low value of diversity of the IP set will be discarded. Summing up, the output of the Message Prefiltering module is a list of candidate flux domains and their related aggregated DNS information (i.e., resolved IP addresses, average TTL, etc.).
  • 9. Domain Clustering  Group domains that are related to each other – Hierarchical clustering algorithm – Similarity measure based on resolved IPs perform domain clustering of flux domains that are related to each other single-linkage hierarchical clustering algorithm is used, which adopts a friends of friends clustering strategy. In order to apply the clustering algorithm to a set of domain names D ={d1, d2, . . . , dn},a measure of similarity between them is defined first.
  • 10. Given two domains α and β, and their cumulative set of resolved IP addresses collected during an epoch E, respectively, Rand R, compute their similarity score as |R∩R| 1 ——— · ——————————— € |R∪R| 1+ eγ−min(|R|,|R|) Sim(α, β) = Jaccard Index ǫ[0, 1] The first factor is the Jaccard index for sets R and R, which intuitively measures the relative overlap between the two cumulative sets of resolved IPs. The second factor is a sigmoidal weight designed to measure the confidence in estimating the Jaccard index.
  • 11. Supervised Classifier  Input : Clusters of domains – Clusters are translated into feature vectors Supervised Training: – Need labeled data(ground truth) – We built a web interface to facilitate semi-manual labeling Output : new (unlabeled) clusters are Labeled as either Flux or non--‐flux
  • 12. Cross-Validation • Label data Dataset – semi--‐manual labeling process – If no clear-cut decision exclude Cluster To minimize training noise – 1,337 clusters labeled as flux • 100,644 distinct 2LDs(113,580FQDs) – 5,708 labeled as non-flux • 2,116 distinct 2LDs(59,215 FQDs)
  • 13. Safe Browsing • Take flux domains and – Check if port 80 is open – Check for valid HTTP response/content – Vet against Safe Browsing (SB) and malware BLs • Most missed by SB are Rogue pharmacies, adult-related sites • SB Only reports Known phishing And malware sites
  • 14. Conclusion The above evaluation showed that Flux Buster is capable of accurately detecting previously unknown flux networks days or even weeks in advanced before they appear in public blacklists. The experimental results show that FluxBuster is able to accurately detect malicious flux networks with a low false positive rate. our detection approach is not limited to the analysis of suspicious domain names extracted from spam emails or precompiled domain blacklists.
  • 15. REFERENCE [1] Roberto Perdisci, Igino Corona, and Giorgio Giacinto. Early Detection of Malicious Flux Networks via Large- Scale Passive DNS Traffic Analysis. In IEEE Transactions on Dependable and Secure Computing, VOL. 9, NO. 5, September/October 2012. [2] M. Knysz, X. Hu, and K.G. Shin.Good Guys vs. Bot Guise: Mimicry Attacks against Fast Flux Detection Systems.In Proc. IEEE INFOCOM, 2011.