Skip to main content

2014 | OriginalPaper | Buchkapitel

2. Malicious Networks for DDoS Attacks

verfasst von : Shui Yu

Erschienen in: Distributed Denial of Service Attack and Defense

Verlag: Springer New York

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this chapter, we explore botnet, the engine of DDoS attacks, in cyberspace. We focus on two recent techniques that hackers are using to sustain their malicious networks, fast fluxing and domain fluxing. We present the mechanisms of these two techniques and also survey the detection and anti-attack methods that have been proposed against them in literature.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat T. Peng, C. Leckie, and K. Ramamohanarao, “Survey of network-based defense mechanisms countering the dos and ddos problems,” ACM Computing Survey, vol. 39, no. 1, 2007. T. Peng, C. Leckie, and K. Ramamohanarao, “Survey of network-based defense mechanisms countering the dos and ddos problems,” ACM Computing Survey, vol. 39, no. 1, 2007.
2.
Zurück zum Zitat M. Edman and B. Yener, “On anonymity in an electronic society: A survey of anonymous communication systems,” ACM Computing Survey, vol. 42, no. 1, 2009. M. Edman and B. Yener, “On anonymity in an electronic society: A survey of anonymous communication systems,” ACM Computing Survey, vol. 42, no. 1, 2009.
3.
Zurück zum Zitat B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna, “Your botnet is my botnet: Analysis of a botnet takeover,” in Proceedings of the ACM conference on computer communication security, 2009, pp. 635–647. B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna, “Your botnet is my botnet: Analysis of a botnet takeover,” in Proceedings of the ACM conference on computer communication security, 2009, pp. 635–647.
4.
Zurück zum Zitat C. Y. Cho, J. Caballero, C. Grier, V. Paxson, and D. Song, “Insights from the inside: A view of botnet management from infiltration,” in Proceedings of USENIX LEET, 2010. C. Y. Cho, J. Caballero, C. Grier, V. Paxson, and D. Song, “Insights from the inside: A view of botnet management from infiltration,” in Proceedings of USENIX LEET, 2010.
5.
Zurück zum Zitat Z. Li, A. Goyal, Y. Chen, and V. Paxson, “Towards situational awareness of large-scale botnet probing events,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 175–188, 2011.CrossRef Z. Li, A. Goyal, Y. Chen, and V. Paxson, “Towards situational awareness of large-scale botnet probing events,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 175–188, 2011.CrossRef
6.
Zurück zum Zitat C. A. Shue, A. J. Kalafut, and M. Gupta, “Abnormally malicious autonomous systems and their internet connectivity,” IEEE/ACM Transactions on Networking, vol. 20, no. 1, pp. 220–230, 2012.CrossRef C. A. Shue, A. J. Kalafut, and M. Gupta, “Abnormally malicious autonomous systems and their internet connectivity,” IEEE/ACM Transactions on Networking, vol. 20, no. 1, pp. 220–230, 2012.CrossRef
7.
Zurück zum Zitat M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, “My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging,” in Proceedings of the first conference on Hot Topics in Understanding Botnets, 2007. M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, “My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging,” in Proceedings of the first conference on Hot Topics in Understanding Botnets, 2007.
8.
Zurück zum Zitat N. Jiang, J. Cao, Y. Jin, L. E. Li, and Z.-L. Zhang, “Identifying suspicious activities through dns failure graph analysis,” in Proceedings of the IEEE International Conference on Network Protocols, 2010, pp. 144–153. N. Jiang, J. Cao, Y. Jin, L. E. Li, and Z.-L. Zhang, “Identifying suspicious activities through dns failure graph analysis,” in Proceedings of the IEEE International Conference on Network Protocols, 2010, pp. 144–153.
9.
Zurück zum Zitat S. Yadav, A. K. K. Reddy, A. L. N. Reddy, and S. Ranjan, “Detecting algorithmically generated malicious domain names,” in Proceedings of the Internet Measurement Conference, 2010, pp. 48–61. S. Yadav, A. K. K. Reddy, A. L. N. Reddy, and S. Ranjan, “Detecting algorithmically generated malicious domain names,” in Proceedings of the Internet Measurement Conference, 2010, pp. 48–61.
10.
Zurück zum Zitat V. L. L. Thing, M. Sloman, and N. Dulay, “A survey of bots used for distributed denial of service attacks,” in Proceedings of the SEC, 2007, pp. 229–240. V. L. L. Thing, M. Sloman, and N. Dulay, “A survey of bots used for distributed denial of service attacks,” in Proceedings of the SEC, 2007, pp. 229–240.
11.
Zurück zum Zitat N. Ianelli and A. Hackworth, “Botnets as vehicle for online crime,” in Proceedings of the 18th Annual FIRST Conference, 2006. N. Ianelli and A. Hackworth, “Botnets as vehicle for online crime,” in Proceedings of the 18th Annual FIRST Conference, 2006.
12.
Zurück zum Zitat P. Wang, S. Sparks, and C. C. Zou, “An advanced hybrid peer-to-peer botnet,” IEEE Transactions on Dependable and Secure Computing, vol. 7, no. 2, pp. 113–127, 2010.CrossRef P. Wang, S. Sparks, and C. C. Zou, “An advanced hybrid peer-to-peer botnet,” IEEE Transactions on Dependable and Secure Computing, vol. 7, no. 2, pp. 113–127, 2010.CrossRef
13.
Zurück zum Zitat M. Bailey, E. Cooke, F. Jahanian, Y. Xu, and M. Karir, “A survey of botnet technology and defenses,” in Proceedings of the cybersecurity applications and technology conference for Homeland security, 2009. M. Bailey, E. Cooke, F. Jahanian, Y. Xu, and M. Karir, “A survey of botnet technology and defenses,” in Proceedings of the cybersecurity applications and technology conference for Homeland security, 2009.
16.
Zurück zum Zitat Y. Tang and S. Chen, “Defending against internet worms: a signature-based approach,” in Proceedings of the INFOCOM, 2005, pp. 1384–1394. Y. Tang and S. Chen, “Defending against internet worms: a signature-based approach,” in Proceedings of the INFOCOM, 2005, pp. 1384–1394.
17.
Zurück zum Zitat C. Li, W. Jiang, and X. Zou, “Botnet: Survey and case study,” in Proceedings of the ICICIC, 2009, pp. 1184–1187. C. Li, W. Jiang, and X. Zou, “Botnet: Survey and case study,” in Proceedings of the ICICIC, 2009, pp. 1184–1187.
18.
Zurück zum Zitat J. R. Binkley and S. Singh, “An algorithm for anomaly-based botnet detection,” in Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet – Volume 2. USENIX Association, 2006. J. R. Binkley and S. Singh, “An algorithm for anomaly-based botnet detection,” in Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet – Volume 2. USENIX Association, 2006.
19.
Zurück zum Zitat A. Karasaridis, B. Rexroad, and D. Hoeflin, “Wide-scale botnet detection and characterization,” in Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets. USENIX Association, 2007. A. Karasaridis, B. Rexroad, and D. Hoeflin, “Wide-scale botnet detection and characterization,” in Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets. USENIX Association, 2007.
20.
Zurück zum Zitat M. Feily, A. Shahrestani, and S. Ramadass, “A survey of botnet and botnet detection,” in Proceedings of the SECURWARE, June 2009, pp. 268–273. M. Feily, A. Shahrestani, and S. Ramadass, “A survey of botnet and botnet detection,” in Proceedings of the SECURWARE, June 2009, pp. 268–273.
22.
Zurück zum Zitat S. Yu, S. Zhou, and S. Wang, “Fast-flux attack network identification based on agent lifespan,” in Proceedings of the WCNIS, June 2010, pp. 658 –662. S. Yu, S. Zhou, and S. Wang, “Fast-flux attack network identification based on agent lifespan,” in Proceedings of the WCNIS, June 2010, pp. 658 –662.
23.
Zurück zum Zitat C. V. Zhou, C. Leckie, and S. Karunasekera, “Collaborative detection of fast flux phishing domains,” Journal of Networks, vol. 4, no. 1, pp. 75–84, 2009.CrossRef C. V. Zhou, C. Leckie, and S. Karunasekera, “Collaborative detection of fast flux phishing domains,” Journal of Networks, vol. 4, no. 1, pp. 75–84, 2009.CrossRef
24.
Zurück zum Zitat T. Holz, C. Gorecki, K. Rieck, and F. C. Freiling, “Measuring and detecting fast-flux service networks,” in Proceedings of the NDSS, 2008. T. Holz, C. Gorecki, K. Rieck, and F. C. Freiling, “Measuring and detecting fast-flux service networks,” in Proceedings of the NDSS, 2008.
25.
Zurück zum Zitat C. V. Zhou, C. Leckie, S. Karunasekera, and T. Peng, “A Self-healing, Self-protecting, Collaborative Intrusion Detection Architecture to Trace-back Fast-flux Phishing Domains,” in Proceedings of the 2nd IEEE Workshop on Autonomic Communication and Network Management, Apr. 2008. C. V. Zhou, C. Leckie, S. Karunasekera, and T. Peng, “A Self-healing, Self-protecting, Collaborative Intrusion Detection Architecture to Trace-back Fast-flux Phishing Domains,” in Proceedings of the 2nd IEEE Workshop on Autonomic Communication and Network Management, Apr. 2008.
26.
Zurück zum Zitat A. Caglayan, M. Toothaker, D. Drapeau, D. Burke, and G. Eaton, “Real-time detection of fast flux service networks,” in Proceedings of Homeland Security, 2009, pp. 285–292. A. Caglayan, M. Toothaker, D. Drapeau, D. Burke, and G. Eaton, “Real-time detection of fast flux service networks,” in Proceedings of Homeland Security, 2009, pp. 285–292.
27.
Zurück zum Zitat R. Perdisci, I. Corona, D. Dagon, and W. Lee, “Detecting malicious flux service networks through passive analysis of recursive dns traces,” in Proceedings of the Computer Security Applications Conference, 2009, pp. 311–320. R. Perdisci, I. Corona, D. Dagon, and W. Lee, “Detecting malicious flux service networks through passive analysis of recursive dns traces,” in Proceedings of the Computer Security Applications Conference, 2009, pp. 311–320.
29.
Zurück zum Zitat P. Porras, H. Saidi, and V. Yegneswaran, “A foray into conficker’s logic and rendezvous points,” in Proceedings of the LEET, 2009. P. Porras, H. Saidi, and V. Yegneswaran, “A foray into conficker’s logic and rendezvous points,” in Proceedings of the LEET, 2009.
31.
Zurück zum Zitat C. Kanich, K. Levchenko, B. Enright, G. M. Voelker, and S. Savage, “The heisenbot uncertainty problem: Challenges in separating bots from chaff.” in Proceedings of the LEET. USENIX Association, 2008. C. Kanich, K. Levchenko, B. Enright, G. M. Voelker, and S. Savage, “The heisenbot uncertainty problem: Challenges in separating bots from chaff.” in Proceedings of the LEET. USENIX Association, 2008.
32.
Zurück zum Zitat J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, “Beyond blacklists: learning to detect malicious web sites from suspicious urls,” in Proceedings of the ACM SIGKDD. ACM, 2009, pp. 1245–1254. J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, “Beyond blacklists: learning to detect malicious web sites from suspicious urls,” in Proceedings of the ACM SIGKDD. ACM, 2009, pp. 1245–1254.
33.
Zurück zum Zitat S. S. Justin Ma, Lawrence Saul and G. Voelker, “Identifying suspicious urls: An application of large-scale online learning,” in In Proc. of the International Conference on Machine Learning (ICML), 2009. S. S. Justin Ma, Lawrence Saul and G. Voelker, “Identifying suspicious urls: An application of large-scale online learning,” in In Proc. of the International Conference on Machine Learning (ICML), 2009.
34.
Zurück zum Zitat N. Jiang, J. Cao, Y. Jin, L. Li, and Z.-L. Zhang, “Identifying suspicious activities through dns failure graph analysis,” in Proceedings of Network Protocols (ICNP), oct. 2010, pp. 144–153. N. Jiang, J. Cao, Y. Jin, L. Li, and Z.-L. Zhang, “Identifying suspicious activities through dns failure graph analysis,” in Proceedings of Network Protocols (ICNP), oct. 2010, pp. 144–153.
35.
Zurück zum Zitat V. Pappas, D. Wessels, D. Massey, S. Lu, A. Terzis, and L. Zhang, “Impact of configuration errors on dns robustness,” Selected Areas in Communications, IEEE Journal, vol. 27, pp. 275–290, 2009. V. Pappas, D. Wessels, D. Massey, S. Lu, A. Terzis, and L. Zhang, “Impact of configuration errors on dns robustness,” Selected Areas in Communications, IEEE Journal, vol. 27, pp. 275–290, 2009.
36.
Zurück zum Zitat Z. Zhu, V. Yegneswaran, and Y. Chen, “Using failure information analysis to detect enterprise zombies.” in SecureComm, vol. 19. Springer, 2009, pp. 185–206. Z. Zhu, V. Yegneswaran, and Y. Chen, “Using failure information analysis to detect enterprise zombies.” in SecureComm, vol. 19. Springer, 2009, pp. 185–206.
37.
Zurück zum Zitat D. Plonka and P. Barford, “Context-aware clustering of dns query traffic,” in Proceedings of the 8th ACM SIGCOMM conference on Internet measurement. ACM, 2008, pp. 217–230. D. Plonka and P. Barford, “Context-aware clustering of dns query traffic,” in Proceedings of the 8th ACM SIGCOMM conference on Internet measurement. ACM, 2008, pp. 217–230.
38.
Zurück zum Zitat Y. Jin, E. Sharafuddin, and Z. L. Zhang, “Unveiling core network-wide communication patterns through application traffic activity graph decomposition,” in Proceedings of the 11th international joint conference on Measurement and modeling of computer systems. ACM, 2009, pp. 49–60. Y. Jin, E. Sharafuddin, and Z. L. Zhang, “Unveiling core network-wide communication patterns through application traffic activity graph decomposition,” in Proceedings of the 11th international joint conference on Measurement and modeling of computer systems. ACM, 2009, pp. 49–60.
39.
Zurück zum Zitat P. Prakash, M. Kumar, R. Kompella, and M. Gupta, “Phishnet: Predictive blacklisting to detect phishing attacks,” in Proceedings of the INFOCOM, 2010, pp. 1–5. P. Prakash, M. Kumar, R. Kompella, and M. Gupta, “Phishnet: Predictive blacklisting to detect phishing attacks,” in Proceedings of the INFOCOM, 2010, pp. 1–5.
40.
Zurück zum Zitat S. Yadav, A. K. K. Reddy, A. N. Reddy, and S. Ranjan, “Detecting algorithmically generated malicious domain names,” in Proceedings of the 10th annual conference on Internet measurement. ACM, 2010, pp. 48–61. S. Yadav, A. K. K. Reddy, A. N. Reddy, and S. Ranjan, “Detecting algorithmically generated malicious domain names,” in Proceedings of the 10th annual conference on Internet measurement. ACM, 2010, pp. 48–61.
41.
Zurück zum Zitat C. C. Zou, W. Gong, D. F. Towsley, and L. Gao, “The monitoring and early detection of internet worms,” IEEE/ACM Transactions on Networking, vol. 13, no. 5, pp. 961–974, 2005.CrossRef C. C. Zou, W. Gong, D. F. Towsley, and L. Gao, “The monitoring and early detection of internet worms,” IEEE/ACM Transactions on Networking, vol. 13, no. 5, pp. 961–974, 2005.CrossRef
42.
Zurück zum Zitat S. H. Sellke, N. B. Shroff, and S. Bagchi, “Modeling and automated containment of worms,” IEEE Transactions on Dependable and Secure Computing, vol. 5, no. 2, pp. 71–86, 2008.CrossRef S. H. Sellke, N. B. Shroff, and S. Bagchi, “Modeling and automated containment of worms,” IEEE Transactions on Dependable and Secure Computing, vol. 5, no. 2, pp. 71–86, 2008.CrossRef
43.
Zurück zum Zitat D. Dagon, C. Zou, and W. Lee, “Modeling botnet propagation using time zones,” in Proceedings of the 13th Network and Distributed System Security Symposium NDSS, 2006. D. Dagon, C. Zou, and W. Lee, “Modeling botnet propagation using time zones,” in Proceedings of the 13th Network and Distributed System Security Symposium NDSS, 2006.
44.
Zurück zum Zitat A. J. Ganesh, L. Massoulié, and D. F. Towsley, “The effect of network topology on the spread of epidemics,” in Proceedings of the INFOCOM, 2005, pp. 1455–1466. A. J. Ganesh, L. Massoulié, and D. F. Towsley, “The effect of network topology on the spread of epidemics,” in Proceedings of the INFOCOM, 2005, pp. 1455–1466.
45.
Zurück zum Zitat J. Omic, A. Orda, and P. V. Mieghem, “Protecting against network infections: A game theoretic perspective,” in Proceedings of the INFOCOM, 2009. J. Omic, A. Orda, and P. V. Mieghem, “Protecting against network infections: A game theoretic perspective,” in Proceedings of the INFOCOM, 2009.
46.
Zurück zum Zitat P. V. Mieghem, J. Omic, and R. Kooij, “Virus spread in networks,” IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 1–14, 2009.CrossRef P. V. Mieghem, J. Omic, and R. Kooij, “Virus spread in networks,” IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 1–14, 2009.CrossRef
47.
Zurück zum Zitat Z. Chen and C. Ji, “An information-theoretic view of network-aware malware attacks,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 3, pp. 530–541, 2009.CrossRef Z. Chen and C. Ji, “An information-theoretic view of network-aware malware attacks,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 3, pp. 530–541, 2009.CrossRef
48.
Zurück zum Zitat M. Steiner, T. En-Najjary, and E. W. Biersack, “Long term study of peer behavior in the kad dht,” IEEE Transactions on Networking, vol. 17, no. 5, pp. 1371–1384, 2009.CrossRef M. Steiner, T. En-Najjary, and E. W. Biersack, “Long term study of peer behavior in the kad dht,” IEEE Transactions on Networking, vol. 17, no. 5, pp. 1371–1384, 2009.CrossRef
49.
Zurück zum Zitat D. Stutzbach and R. Rejaie, “Understanding churn in peer-to-peer networks,” in Proceedings of the Internet Measurement Conference, 2006, pp. 189–202. D. Stutzbach and R. Rejaie, “Understanding churn in peer-to-peer networks,” in Proceedings of the Internet Measurement Conference, 2006, pp. 189–202.
50.
Zurück zum Zitat S. Sen and J. Wang, “Analyzing peer-to-peer traffic across large networks,” IEEE/ACM Transactions on Networking, vol. 12, no. 2, pp. 219–232, 2004.CrossRef S. Sen and J. Wang, “Analyzing peer-to-peer traffic across large networks,” IEEE/ACM Transactions on Networking, vol. 12, no. 2, pp. 219–232, 2004.CrossRef
51.
Zurück zum Zitat D. J. Daley and J. Gani, Epidemic Modelling: An Introduction. Cambridge University Press, 1999. D. J. Daley and J. Gani, Epidemic Modelling: An Introduction. Cambridge University Press, 1999.
52.
Zurück zum Zitat N. Bailey, The Mathematical Theory of Epidemics. John Wiley & Sons, 1957. N. Bailey, The Mathematical Theory of Epidemics. John Wiley & Sons, 1957.
Metadaten
Titel
Malicious Networks for DDoS Attacks
verfasst von
Shui Yu
Copyright-Jahr
2014
Verlag
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-9491-1_2

Premium Partner