BotDigger: Detecting DGA bots in a single network
Abstract
To improve the resiliency of communication between bots and C&C servers, bot masters began utilizing Domain Generation Algorithms (DGA) in recent years. Many systems have been introduced to detect DGA-based botnets. However, they suffer from several limitations, such as requiring DNS traffic collected across many networks, the presence of multiple bots from the same botnet, and so forth. These limitations make it very hard to detect individual bots when using traffic collected from a single network. In this paper, we introduce BotDigger, a system that detects DGA-based bots using DNS traffic without a priori knowledge of the domain generation algorithm. BotDigger utilizes a chain of evidence, including quantity, temporal and linguistic evidence to detect an individual bot by only monitoring traffic at the DNS servers of a single network. We evaluate BotDigger's performance using traces from two DGA-based botnets: Kraken and Conflicker. Our results show that BotDigger detects all the Kraken bots and 99.8% of Conficker bots. A one-week DNS trace captured from our university and three traces collected from our research lab are used to evaluate false positives. The results show that the false positive rates are 0.05% and 0.39% for these two groups of background traces, respectively.
Publication Title
Traffic Monitoring and Analysis - 8th International Workshop, TMA 2016
Recommended Citation
Zhang, H., Gharaibeh, M., Thanasoulas, S., & Papadopoulos, C. (2016). BotDigger: Detecting DGA bots in a single network. Traffic Monitoring and Analysis - 8th International Workshop, TMA 2016 Retrieved from https://digitalcommons.memphis.edu/facpubs/2588