Visible to the public A Method for Detecting DGA Botnet Based on Semantic and Cluster Analysis

TitleA Method for Detecting DGA Botnet Based on Semantic and Cluster Analysis
Publication TypeConference Paper
Year of Publication2016
AuthorsTong, Van, Nguyen, Giang
Conference NameProceedings of the Seventh Symposium on Information and Communication Technology
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4815-7
Keywordsbigram, botnets, DGA botnet, DGA botnet detection, Human Behavior, Mahalanobis distance, Metrics, NXDomain, pubcrawl, Scalability, spam detection
Abstract

Botnets play major roles in a vast number of threats to network security, such as DDoS attacks, generation of spam emails, information theft. Detecting Botnets is a difficult task in due to the complexity and performance issues when analyzing the huge amount of data from real large-scale networks. In major Botnet malware, the use of Domain Generation Algorithms allows to decrease possibility to be detected using white list - blacklist scheme and thus DGA Botnets have higher survival. This paper proposes a DGA Botnet detection scheme based on DNS traffic analysis which utilizes semantic measures such as entropy, meaning the level of the domain, frequency of n-gram appearances and Mahalanobis distance for domain classification. The proposed method is an improvement of Phoenix botnet detection mechanism, where in the classification phase, the modified Mahalanobis distance is used instead of the original for classification. The clustering phase is based on modified k-means algorithm for archiving better effectiveness. The effectiveness of the proposed method was measured and compared with Phoenix, Linguistic and SVM Light methods. The experimental results show the accuracy of proposed Botnet detection scheme ranges from 90 to 99,97% depending on Botnet type.

URLhttp://doi.acm.org/10.1145/3011077.3011112
DOI10.1145/3011077.3011112
Citation Keytong_method_2016