An Fpga-based System for Detecting Malicious Dns Network Traffic

نویسندگان

  • Brennon D. Thomas
  • Barry E. Mullins
  • Gilbert L. Peterson
  • Robert F. Mills
چکیده

Billions of packets traverse computer networks every day. Often, these packets have legitimate destinations such as buying a book at amazon.com or streaming a video. Unfortunately, malicious and suspicious network traffic continues to plague the Internet. One example is abusing the Domain Name System (DNS) protocol to exfiltrate sensitive data, establish backdoor tunnels, or control botnets. To counter this abuse and provide better incident detection, a forensic tool is developed to detect suspicious DNS traffic. The forensic tool is derived from the TRacking and Analysis for Peer-to-Peer (TRAPP) system, developed in 2008, to detect BitTorrent and Voice over Internet Protocol (VoIP) traffic of interest. Using concepts and technology developed for the TRAPP system, the new TRAPP-2 system forensic tool is constructed on a Xilinx Virtex-5 ML510 Field Programmable Gate Array (FPGA) board. The TRAPP-2 system detects a DNS packet, extracts the payload, compares the data against a hash list and, if the packet is suspicious, logs the entire packet for future analysis. The goal of this research is to evaluate the performance of the TRAPP-2 system as a solution to detect and track malicious DNS packets traversing a gigabit Ethernet network. Results show that the TRAPP-2 system captures 91.89% of DNS packets of interest while under a 93.7% network load (937 Mbps). In another experiment, the hash list size is increased from 1,000 to 131,072,000 unique items and reveals that each doubling of the hash list size results in a mean increase of approximately 16 central processing unit cycles. These results demonstrate the TRAPP-2 system’s ability to detect traffic of interest under a saturated network while maintaining large hash lists.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Active Bot Networks Based on DNS Traffic Analysis

Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential for the proper functioning of the network, it is very useful for monitoring, detecting and redu...

متن کامل

An FPGA System for Detecting Malicious DNS Network Traffic

Billions of legitimate packets traverse computer networks every day. Unfortunately, malicious traffic also traverses these same networks. An example is traffic that abuses the Domain Name System (DNS) protocol to exfiltrate sensitive data, establish backdoor tunnels or control botnets. This paper describes the TRAPP-2 system, an extended version of the Tracking and Analysis for Peer-to-Peer (TR...

متن کامل

GMAD: Graph-based Malware Activity Detection by DNS traffic analysis

Malicious activities on the Internet are one of the most dangerous threats to Internet users and organizations. Malicious software controlled remotely is addressed as one of the most critical methods for executing the malicious activities. Since blocking domain names for command and control (C&C) of the malwares by analyzing their Domain Name System (DNS) activities has been the most effective ...

متن کامل

Detecting Botnet Activities Based on Abnormal DNS traffic

The botnet is considered as a critical issue of the Internet due to its fast growing mechanism and affect. Recently, Botnets have utilized the DNS and query DNS server just like any legitimate hosts. In this case, it is difficult to distinguish between the legitimate DNS traffic and illegitimate DNS traffic. It is important to build a suitable solution for botnet detection in the DNS traffic an...

متن کامل

Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011