Study of DNS Based On the Command and Control

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)
 
© 2014 by IJCTT Journal
Volume-16 Number-2
Year of Publication : 2014
Authors : D.Mounika , K Krishna reddy , Janapati Venkata Krishna

MLA

D.Mounika , K Krishna reddy , Janapati Venkata Krishna. "Study of DNS Based On the Command and Control". International Journal of Computer Trends and Technology (IJCTT) V16(2):45-49, Oct 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Attackers, in particular botnet controllers, use secret messaging systems to set up large-scale command and control. In order to systematically understand the potential capability of attackers, we investigate the practicable of using domain name service (DNS) as a stealthy botnet command-and-control channel. We explain and quantitatively analyze several techniques that can be used to effectively hide malicious DNS activities at the network level. Our experimental result makes use of a two-month-long 4.8GB campus network dataset and 1 million domain names obtained from alexa.com. We conclude that the DNS-based secret command-and-control channel (in particular the code word mode) can be very powerful for attackers, showing the requirement for further research by defenders in this direction. The resulting statistical analysis of DNS payload as a countermeasure has practical limitations inhibiting its large-scale deployment.

References
[1] R. Buyya, D. Abramson, J. Giddy, and H. Stockinger, “Economic Models for Resource Management and Scheduling in Grid Computing,” Concurrency and Computation: Practice and Experience, vol. 14, pp. 1507-1542, 2007.
[2] R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the Fifth Utility,” Future Generation Computer Systems, vol. 25, no. 6, pp. 599-616, 2009.
[3] A.P. Chandrakasan, S. Sheng, and R.W. Brodersen, “Low-Power CMOS Digital Design,” IEEE J. Solid-State Circuits, vol. 27, no. 4, pp. 473-484, Apr. 1992.
[4] B.N. Chun and D.E. Culler, “User-Centric Performance Analysis of Market-Based Cluster Batch Schedulers,” Proc. Second IEEE/ACM Int’l Symp. Cluster Computing and the Grid, 2002.
[5] D. Durkee, “Why Cloud Computing Will Never be Free,” Comm. ACM, vol. 53, no. 5, pp. 62-69, 2010.
[6] R. Ghosh, K.S. Trivedi, V.K. Naik, and D.S. Kim, “End to-End Performability Analysis for Infrastructure-as-a-Service Cloud: An Interacting Stochastic Models Approach,” Proc. 16th IEEE Pacific Rim Int’l Symp. Dependable Computing, pp. 125-132, 2010.