Detecting mass-mailing worm infected hosts by mining DNS traffic data

  • Authors:
  • Keisuke Ishibashi;Tsuyoshi Toyono;Katsuyasu Toyama;Masahiro Ishino;Haruhiko Ohshima;Ichiro Mizukoshi

  • Affiliations:
  • NTT Corporation, Tokyo, Japan;NTT Corporation, Tokyo, Japan;NTT Corporation, Tokyo, Japan;NTT Communications Corporation, Tokyo, Japan;NTT Communications Corporation, Tokyo, Japan;NTT Communications Corporation, Tokyo, Japan

  • Venue:
  • Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data
  • Year:
  • 2005

Quantified Score

Hi-index 0.01

Visualization

Abstract

The Domain Name System (DNS) is a critical infrastructure in the Internet; thus, monitoring its traffic, and protecting DNS from malicious activities are important for security in cyberspace. However, it is often difficult to determine whether a DNS query is caused by malicious or normal activity, because information available in DNS traffic is limited.We focus on the activities of mass-mailing worms and propose a method to detect hosts infected by mass-mailing worms by mining DNS traffic data. Our method begins with a small amount of a priori knowledge about a signature query. By assuming that queries sent by most hosts that have sent the signature query of worms have been sent by worm behavior, we detect infected hosts using Bayesian estimation.We apply our method to DNS traffic data captured at one of the largest commercial Internet Service Providers in Japan, and the experimental result indicates that an 89% reduction of mail exchange queries can be achieved with the method.