Table 2: Number of analyzed domains and botnet identification rate for different techniques.
Technique Number of Number of % true % false
normal domains botnet domains positives positives
BDS 250,062 674 68% 3.18%
NXDOMAIN-1 172 0 0% 0%
NXDOMAIN-2 67,427 311 20% 99.87%
would allow, for example, to ignore those misspelled
domain names because they would be requested only
once.
ACKNOWLEDGEMENTS
This work was supported by S21sec labs through
the research project SEGUR@, funded by the Span-
ish Ministry of Industry, Tourism and Trade, on
the framework of CENIT programme with reference
CENIT-2007 2004.
REFERENCES
Binkley, R. and Singh, S. (2006). An Algorithm for
Anomaly-based Botnet Detection. Computer Science,
PSU, USENIX SRUTI: ’06 2nd Workshop on Steps to
Reducing Unwanted Traffic on the Internet.
Binsalleeh, H., Ormerod, T., Boukhtouta, A., Sinha, P.,
Youssef, A., Debbabi, M., and Wang, L. (2010). On
the analysis of the zeus botnet crimeware toolkit. In
Privacy Security and Trust (PST), 2010 Eighth Annual
International Conference on, pages 31 –38.
Chiang, K. and Lloyd, L. (2007). A case study of the rus-
tock rootkit and spam bot. In Proceedings of the first
conference on First Workshop on Hot Topics in Under-
standing Botnets, pages 10–10, Berkeley, CA, USA.
USENIX Association.
Dagon, D. (2005). Botnet Detection and Response, The
Network is the Infection. In 1st DNS-OARC Work-
shop, Santa Clara, CA.
DiG (2009). Tool from the package dnsutils. http://
www.ubuntuupdates.org/packages/show/105545.
DNSDUMP (2010). Perl script that captures and displays
DNS messages. http://dns.measurement-factory.com/
tools/dnsdump/.
Feily, M., Shahrestani, A., and Ramadass, S. (2009). A Sur-
vey of Botnet and Botnet Detection. In Third Interna-
tional Conference on Emerging Security Information,
Systems and Technologies, Athens/Glyfada, Greece.
Goebel, J. and Holz, T. (2007). Rishi: Identify bot con-
taminated hosts by irc nickname evaluation. In First
USENIX Workshop on Hot Topics in Understanding
Botnets (HotBots’07), Cambridge, MA.
Grizzard, J., Sharma, V., C. Nunnery, B. K., and Dagon,
D. (2007). Peer-to-peer botnets: Overview and case
study. In First USENIX Workshop on Hot Topics
in Understanding Botnets (HotBots’07), Cambridge,
MA.
Gu, G., Perdisci, R., Zhang, J., and Lee, W. (2008a). Bot-
Miner: Clustering Analysis of Network Traffic for
Protocol-and Structure-Independent Botnet Detection.
In 17th USENIX Security Symposium (Security’08),
San Jose, CA.
Gu, G., Zhang, J., and Lee, W. (2008b). Botsniffer: Detect-
ing botnet command and control channels in network
traffic. In 15th Annual Network and Distributed Sys-
tem Security Symposium (NDSS’08), San Diego, CA.
Holz, T., Gorecki, C., Rieck, K., and Freiling, F. C. (2008).
Measuring and detecting fast-flux service networks. In
15th Annual Network and Distributed System Security
Symposium (NDSS’08), San Diego, CA.
Jae-Seo, L., HyunCheol, J., Jun-Hyung, P., Minsoo, K., and
Bong-Nam, N. (2008). The activity analysis of mali-
cious http-based botnets using degree of periodic re-
peatability. In Security Technology, 2008. SECTECH
’08. International Conference on, pages 83 –86.
John, J. P., Moshchuk, A., D.Gribble, S., and Krishna-
murthy, A. (2009). Studying spamming botnets us-
ing botlab. In Proceedings of the 6th USENIX sym-
posium on Networked systems design and implemen-
tation, pages 291–306, Berkeley, CA, USA. USENIX
Association.
Jones, J. K. and Romney, G. W. (2004). Honeynets: an edu-
cational resource for it security. In Proceedings of the
5th conference on Information technology education,
CITC5 ’04, pages 24–28, New York, NY, USA. ACM.
Net-Whois (2010). Module for parsing WHOIS informa-
tion. http://search.cpan.org/∼ivsokolov/Net-Whois-
Parser-0.05/.
Passerini, E., Paleari, R., Martignoni, L., and Bruschi, D.
(2008). Fluxor: Detecting and monitoring fast-flux
service networks. In Proceedings of the 5th inter-
national conference on Detection of Intrusions and
Malware, and Vulnerability Assessment, DIMVA ’08,
pages 186–206, Berlin, Heidelberg. Springer-Verlag.
Perdisci, R., Corona, I., Dagon, D., and Lee, W. (2009). De-
tecting malicious flux service networks through pas-
sive analysis of recursive dns traces. In Computer
Security Applications Conference, 2009. ACSAC ’09.
Annual, pages 311 –320.
Porras, P., Sadi, H., and Yegneswaran, V. (2009). A
foray into confickers logic and rendezvous points. In
In USENIX Workshop on Large-Scale Exploits and
Emergent Threats.
Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szyd-
lowski, M., Kemmerer, R., Kruegel, C., and Vigna, G.
(2009). Your botnet is my botnet: analysis of a botnet
takeover. In Proceedings of the 16th ACM conference
BOTNET DETECTION BASED ON DNS RECORDS AND ACTIVE PROBING
315