An uneven game of hide and seek: Hiding botnet CnC by encrypting IPs in DNS records

Martin Fejrskov Andersen, Jens Myrup Pedersen, Leon Böck, Emmanouil Vasilomanolakis

Publikation: Bidrag til bog/antologi/rapport/konference proceedingKonferenceartikel i proceedingForskningpeer review

224 Downloads (Pure)

Abstract

Botnets frequently use DGA and fast-flux techniques to ensure the availability of their command and control (CnC) infrastructure. However, the CnC IP addresses are still exposed in plain-text in publicly available DNS A records, which can be exploited by defenders to disrupt botnet operations. This paper presents the concept of the IP Generation Algorithm (IGA) as a novel method, usable by botmasters, to encrypt the CnC IP address in DNS records to avoid plain-text IP address exposure. This raises the bar for blacklisting malicious IP addresses, and can also be combined with existing techniques to further harden the CnC. For use by defenders, an IGA botnet detection method based on the combination of DNS and NetFlow data is presented and validated using an emulated botnet and an ISP data set.
OriginalsprogEngelsk
Titel2021 IEEE Conference on Communications and Network Security, CNS 2021
Antal sider9
ForlagIEEE
Publikationsdato10 feb. 2022
Sider164-172
ISBN (Trykt)9781665444972
ISBN (Elektronisk)9781665444965
DOI
StatusUdgivet - 10 feb. 2022
BegivenhedIEEE Conference on Communications and Network Security - Tempe, USA
Varighed: 4 okt. 20216 okt. 2021
https://doi.org/10.1109/CNS53000.2021

Konference

KonferenceIEEE Conference on Communications and Network Security
Land/OmrådeUSA
ByTempe
Periode04/10/202106/10/2021
Internetadresse

Fingeraftryk

Dyk ned i forskningsemnerne om 'An uneven game of hide and seek: Hiding botnet CnC by encrypting IPs in DNS records'. Sammen danner de et unikt fingeraftryk.

Citationsformater