A survey on malicious domains detection through DNS data analysis

Y Zhauniarovich, I Khalil, T Yu, M Dacier - ACM Computing Surveys …, 2018 - dl.acm.org
Malicious domains are one of the major resources required for adversaries to run attacks
over the Internet. Due to the important role of the Domain Name System (DNS), extensive …

A survey of botnet detection based on DNS

K Alieyan, A ALmomani, A Manasrah… - Neural Computing and …, 2017 - Springer
Botnet is a thorny and a grave problem of today's Internet, resulting in economic damage for
organizations and individuals. Botnet is a group of compromised hosts running malicious …

From {Throw-Away} traffic to bots: Detecting the rise of {DGA-Based} malware

M Antonakakis, R Perdisci, Y Nadji… - 21st USENIX Security …, 2012 - usenix.org
Many botnet detection systems employ a blacklist of known command and control (C&C)
domains to detect bots and block their traffic. Similar to signature-based virus detection, such …

Beehive: Large-scale log analysis for detecting suspicious activity in enterprise networks

TF Yen, A Oprea, K Onarlioglu, T Leetham… - Proceedings of the 29th …, 2013 - dl.acm.org
As more and more Internet-based attacks arise, organizations are responding by deploying
an assortment of security products that generate situational intelligence in the form of logs …

Phoenix: DGA-based botnet tracking and intelligence

S Schiavoni, F Maggi, L Cavallaro, S Zanero - International Conference on …, 2014 - Springer
Modern botnets rely on domain-generation algorithms (DGAs) to build resilient command-
and-control infrastructures. Given the prevalence of this mechanism, recent work has …

{FANCI}: Feature-based automated {NXDomain} classification and intelligence

S Schüppen, D Teubert, P Herrmann… - 27th USENIX Security …, 2018 - usenix.org
FANCI is a novel system for detecting infections with domain generation algorithm (DGA)
based malware by monitoring non-existent domain (NXD) responses in DNS traffic. It relies …

Issues and challenges in DNS based botnet detection: A survey

M Singh, M Singh, S Kaur - Computers & Security, 2019 - Elsevier
Cybercrimes are evolving on a regular basis and as such these crimes are becoming a
greater threat day by day. Earlier these threats were very general and unorganized. In the …

DBod: Clustering and detecting DGA-based botnets using DNS traffic analysis

TS Wang, HT Lin, WT Cheng, CY Chen - Computers & Security, 2017 - Elsevier
Botnets are one of the leading threats to network security nowadays and are used to conduct
a wide variety of malicious activities, including information theft, phishing, spam mail …

Survey and taxonomy of botnet research through life-cycle

RA Rodríguez-Gómez, G Maciá-Fernández… - ACM Computing …, 2013 - dl.acm.org
Of all current threats to cybersecurity, botnets are at the top of the list. In consequence,
interest in this problem is increasing rapidly among the research community and the number …

Detecting malicious domains via graph inference

P Manadhata, S Yadav, P Rao, W Horne - Proceedings of the 2014 …, 2014 - dl.acm.org
Organizations, especially business enterprises, collect and store event logs generated by
hardware devices and software applications in their networks. For example, firewalls log …