JOURNAL OF NETWORKS, VOL. 4, NO. 1, FEBRUARY
|
|
|
- Noah Holland
- 10 years ago
- Views:
Transcription
1 JOURNAL OF NETWORKS, VOL. 4, NO. 1, FEBRUARY 29 7 Collaborative Detection of Fast Flux Phishing Domains Chenfeng Vincent Zhou, Christopher Leckie and Shanika Karunasekera Department of Computer Science and Software Engineering, The University of Melbourne, Australia {cvzhou, caleckie, shanika}@csse.unimelb.edu.au Abstract Phishing is a significant security threat to users of Internet services. Nowadays, phishing has become more resilient to detection and trace-back with the invention of Fast Flux (FF) service networks. We propose two approaches to correlate evidence from multiple DNS servers and multiple suspect FF domains. Real-world experiments show that our correlation approaches speed-up FF domain detection, based on an analytical model that we propose to quantify the number of DNS queries needed to confirm a FF domain. We also show how our correlation scheme can be implemented on a large scale by using a decentralized publish-subscribe correlation model called LarSID, which is more scalable than a fully centralized architecture. Index Terms phishing, fast flux service networks, collaborative intrusion detection, round-robin DNS I. INTRODUCTION Phishing is a form of social engineering attack, which exploits human vulnerabilities rather than software vulnerabilities. In order to initiate phishing scams, the phishers (the operator of phishing sites) send out a large number of fraudulent s that include a link to the website under their control. These s normally spoof a reputable company, and encourage a quick reply so that users information can be collected before the phishing site is taken down []. The potential victim then connects to a spoofed website by clicking on the link provided by the spam . An accurate imitation of the legitimate organization s website is presented to ensure that the victim enters their personal details. The compromised details can then be used by the phisher for financial gain. Gartner has estimated the cost of identity theft increased from $2bn to $3.2bn in 27 in the USA alone [7], [8]. In order to address this security challenge, significant resources have been invested in anti-phishing research. A range of anti-phishing tools have been proposed [2], [3], [6], as well as more fundamental research [], [12], [13], [17]. One of the most common approaches to the problem has been phishing site take-down [18], i.e., removing a fraudulent website. A key part of any takedown procedure is the problem of trace-back of hosting systems for phishing websites, i.e., finding the underlying computers that host the site. Traditional phishing hosts can be traced back relatively quickly based on their public An extended version of this paper can be found in our technical report Collaborative Detection of Fast Flux Phishing Domains, by C. V. Zhou, C. Leckie, S. Karunasekera, which can be located at cvzhou/pub/jnw full.pdf. DNS name or directly by their IP address if it is embedded within the original spam . Further action can then be taken against the identified phishing host. In order to protect their criminal assets, the operators of phishing sites invented a better architecture called Fast Flux (FF) service networks to hide the hosting machine of phishing websites from trace-back. In FF networks, a large number of proxy hosts are used to relay requests to the back-end server, called a mothership, that actively hosts the phishing site (called the FF domain). Hundreds or even thousands of compromised computers can be used as the front-end proxies. The DNS infrastructure is then used to map the phishing domain name to different front-end proxies. This multi-layer architecture makes it extremely difficult to trace-back the hosting machine, which is hiding behind many front-end proxies. Recent research has identified a method for detecting possible FF domains by searching for domains that are associated with many IP addresses and use short time-tolive (TTL) values in their DNS query results [9], [28]. There are two potential limitations of this approach. (1) We can expect FF domain operators to send fewer IP addresses from a single query, so that the above detection method can be evaded. (2) It may require multiple queries to confirm whether a suspect domain is actually a FF domain, which increases the time required for FF domain detection. In order to address these limitations, our aim in this paper is to reduce the time required to detect FF domains by correlating evidence from multiple sources. In this paper, we present several approaches to correlating evidence about FF domains. We first begin by characterising the behavior of FF domains based on evidence collected from multiple points around the Internet on real FF domains. Based on an analysis of the behavior of the FF domains, we present an analytical model of the number of DNS queries needed to confirm a FF domain, and we use this analytical model to motivate our approach to correlation. We then present two approaches to correlating FF evidence to speed up detection: (1) correlate IP addresses using queries from multiple DNS servers; (2) correlate results of queries from multiple possible FF domains. In both cases, we empirically demonstrate the potential speed up in detection using these correlation schemes. Finally, we consider the problem of how to correlate evidence on a large scale across the Internet. The rest of this paper is organized as follows. In Section II, we describe the background of phishing
2 76 JOURNAL OF NETWORKS, VOL. 4, NO. 1, FEBRUARY 29 3 Number of days online for site maximum average.tk DNS server 2 ns1.ffdomain1.tk 3 mothership of HTTP Month in 27 Figure 1. Lifetime for phishing sites observed in 27 root DNS server 1 user Z 4 front-end proxies of Figure 2. A real-world example of a fast flux service network domains, and highlight the detection challenges of FF domains. We then propose a theoretical model to analyze the problem of FF domain detection in Section III. We propose two correlation schemes for FF domain detection based on multiple DNS servers and multiple FF domains, and present evaluation results based on a real-world experiment in Section IV. In Section V, we introduce a decentralized platform to support the proposed correlation schemes. We review the related work in Section VI, and conclude the paper in Section VII. II. BACKGROUND ON PHISHING DOMAINS In this section, we first describe recent trends in phishing attacks and their corresponding impact on Internet security. We next explain the technical details of a new technique, Fast Flux (FF) service networks, which are used to host phishing domains (note that we refer to domains that are hosted by FF networks as FF domains in the rest of this paper). We then revisit several preliminary efforts to detect FF domains in the literature, and finally highlight the open research issues in FF domain detection that motivate our work in the following sections. A. Trends and Impact of Phishing Since phishing made its debut in the mid 199 s by targeting America Online, it has become a major threat to online services. According to the data collected by the APWG (Anti-Phishing Work Group) [1] in 27, there were more than 2, unique phishing domains reported every month in 27 except February. With increased efforts in anti-phishing, the average online time for phishing domains has decreased from 4 days to 3 days, as shown in Figure 1. However, the longest online time has remained steady at 3 days, due to the evolution of phishing techniques, such as FF service networks [23]. B. Fast Flux Service Networks A Fast Flux (FF) service network is a term coined in the anti-spam community to describe a decentralized botnet (i.e., a network of compromised computer systems) with constantly changing public DNS records, which enables their controller (the attacker) to hide and sustain malicious websites [23]. The method of changing IP addresses dynamically is borrowed from a technique called roundrobin DNS, which is used by legitimate companies for load balancing. A round-robin DNS works on a rotating basis so that in response to a DNS request, the least recently used IP address is selected from a list. In a FF network, compromised machines are used merely as frontline proxies, so that the attackers are safely hidden behind a veil of constantly shifting IP addresses. From the attacker s perspective, the FF architecture with multiple proxies helps to protect their criminal assets. Multiple proxies can be used for load balancing during the phishing attack. Moreover, thousands of front-end proxies can confuse any attempts to trace the phishing server, and make it difficult to shut-down the front-end proxies. In general, the computer systems in FF service networks can be divided into two layers based on their functionality. The front-end proxies are a large pool of compromised computer systems that serve as the first layer of a FF network. They are normally used for blind proxy redirection. At first, their IP addresses are assigned to the same fully qualified domain name. These addresses are swapped frequently in a round-robin manner by using very short TTL values for each given DNS resource record. Then the corresponding request and data to the advertised domain name will be funelled to and from the second layer - the mothership that actually delivers content back to the misled user who requests it. Figure 2 describes the layered architecture of a real-world FF network that hosts the phishing domain (note that the phishing domain names appearing in this paper have been anonymized to preserve privacy), and also illustrates the DNS query process for this FF domain. As shown in Figure 2, after user Z clicks on the link of that is embedded inside a spam message and points to a domain owned by the phisher, the DNS lookup process can be analyzed as follows: 1) User Z queries the DNS root nameserver (usually through their browser) for the top-level domain.tk and receives an answer. 2) User Z asks the.tk nameserver for the domain ffdomain1.tk, and is referred to a nameserver ns1.ffdomain1.tk, which is a DNS server under the control of the attacker or an illegal DNS server from a country where the DNS servers are loosely monitored. In this example, the IP address of the nameserver keeps changing frequently, which is a double-flux architecture based on the definition
3 JOURNAL OF NETWORKS, VOL. 4, NO. 1, FEBRUARY TABLE I. A SAMPLE DNS ENTRY FOR FAST FLUX DOMAIN Domain Name TTL Class Types Type-specific-data ffdomain1.tk. 6 IN A ffdomain1.tk. 6 IN A ffdomain1.tk. 6 IN A ffdomain1.tk. 6 IN A ffdomain1.tk. 6 IN A ffdomain1.tk IN NS ns1.ffdomain1.tk. ns1.ffdomain1.tk. 83 IN A ns1.ffdomain1.tk. 83 IN A ns1.ffdomain1.tk. 83 IN A ns1.ffdomain1.tk. 83 IN A ns1.ffdomain1.tk. 83 IN A in [23]. If it is a single-flux architecture, the IP address for the nameserver remains unchanged for a comparatively longer time period, such as 24 hours. 3) User Z queries the authoritative name server ns1.ffdomain1.tk for the actual IP address of and receives an IP address from the pool of FF front-end proxies, which is normally the IP address of a compromised home computer. 4) User Z then initiates direct communication with the IP address that is assigned to e.g., (note that the first eight bits of any IP address appearing in this paper have been anonymized to preserve privacy). This IP address is usually frequently changed. ) All the HTTP requests from user Z to the front-end proxy ( ) are actually redirected to the mothership that will respond to the victim. A snapshot of the corresponding DNS lookup results are shown in Table I. This shows DNS A records that were returned by a DNS query for the domain ffdomain1.tk. Note that the TTL field of these A records is set to 6 seconds (1 minutes). This means that the front-end proxies returned for this FF domain will change every 1 minutes in a round-robin manner. In the bottom of Table I, we see that multiple hosts are used as the nameserver ns1.ffdomain1.tk, which change after 83 seconds. In traditional phishing scams, the resolvable main IP address of the phishing domain can normally be located, hence the corresponding connection can be blocked. However, the distributed, constantly changing infrastructure of a FF domain makes it impractical to trace-back the real hosting machine (the FF mothership) and shut down its operations. If we try to shut down the IP address that the phishing domain is currently resolved to, there are thousands of other candidate IP addresses to be resolved in the phishing domain by the DNS server. In this doubleflux service network, even the IP addresses of the DNS nameservers keep changing. C. Previous Work on Fast Flux Domain Detection In order to address the challenges of FF domain detection, there are several approaches that have been proposed [9], [28]. These approaches focus on detecting the front-end proxies in FF networks, using distinct features, such as short TTL values and multiple A records from the DNS query results of a FF domain. In [28], we proposed a multi-layer FF domain trace-back approach. A suspect FF domain is tested using DNS queries based on the number of unique A records returned, the TTL value, and the similarity of the domain name to a well-known domain. Holz et al. [9] proposed a similar approach to FF network detection and measurement, during the same period as our research in [28] was being conducted. In order to distinguish between a FF domain and a legitimate domain, a FF score is calculated based on the number of unique A records, the number of NS records and the number of unique autonomous systems (ASs) from the results of DNS queries for the suspect domain. D. Open Research Issues Several open research problems are raised by this existing research into the detection of FF domains. First, as described in the previous subsection, both detection approaches [28] and [9] are based on the principle that the results of a DNS query to a FF domain will contain many unique IP addresses. In order to evade this approach to detection, we may expect attackers to become more stealthy by limiting the number of FF front-end proxies returned for a single DNS query. This raises the question of how we detect a FF domain based if a smaller number of IP addresses are returned with each query? Second, it is important to detect FF domains as quickly as possible in order to minimize the damage they can cause. We have observed that the IP addresses returned in response to a DNS query to a FF domain appear to be drawn at random from a pool of available IP addresses. If DNS queries from different networks return different IP addresses, then by combining the list of IP addresses observed from different locations in the Internet, is it possible to confirm that a domain is a FF domain more quickly? If so, can we quantify the benefit of combining the results of DNS queries from multiple networks? Third, another trend we have observed is that different phishing domains are operating on the same FF network infrastructure. Thus, several FF phishing domains can use the same IP address as a proxy. Consequently, can we correlate IP addresses across different suspect phishing domains in order to speed-up detection? III. ANALYTICAL MODEL FOR IDENTIFYING FAST FLUX DOMAINS In this section, we first propose a theoretical approach to model the time required to confirm that a given domain is actually a FF domain, by analyzing the relationship between the number of DNS queries and the number of unique IP addresses returned. We then extend this analytical model to quantify the time that can be saved by combining DNS queries from different networks. Consider the case of a FF domain containing H frontend proxies, where we need to observe a minimum of h
4 78 JOURNAL OF NETWORKS, VOL. 4, NO. 1, FEBRUARY 29 unique IP addresses belonging to a domain before it is considered to be a FF domain. Each DNS query samples the set of hosts, and returns an IP address that is drawn at random from the set of H possible hosts. Assuming that samples are independent, in some cases a query will return a new IP address, while in other cases it will return an IP address that we have already seen. Let X h,h be a random variable that denotes the number of queries issued before we observe the minimum number h of unique IP addresses (out of a possible set of all H IP addresses that belong to the domain) required to consider the domain to be a FF domain. The aim of our analysis is to determine the expected number of queries E(X h,h ) in order to observe h unique hosts from a set of H hosts. Based on our real-time monitoring of several FF domains, we can divide the process of identifying the IP addresses that belong to a FF domain into two phases. In the discovery phase, we are sampling from a large, static pool of IP addresses used in FF networks, while in the stable phase new front-end proxies are gradually being added to the initial pool of IP addresses. For example, Figure 3 plots the number of unique IP addresses identified by 48 DNS queries for the FF domain in August 28. The DNS lookup was conducted every 1 minutes, and there were 14 IP addresses returned by the FF domain for each query. As shown in Figure 3, the results from the first 2 queries form the discovery phase, where there were 14 out of approximately 11 unique IP addresses returned each time in a random manner, as the front-end proxies for the FF domain The remaining lookup results form the stable phase, where new IP addresses are added gradually to the FF network, i.e., 14 IP addresses are selected from an increasing number of IP addresses each time. Given that in the discovery phase we can identify a set of h hosts with the fewest queries, we model the discovery phase as a random sampling problem. We model the discovery phase as an example of the coupon collector problem [16], which finds the expected number of samples needed (with replacement) from a population of H objects in order to sample each object at least once. It can be shown [16] that if Y i,h denotes the number of samples made in order to go from having seen i 1 objects to i objects, then E(Y i,h )= H H i +1,and E(X H,H ) = E(Y 1,H )+E(Y 2,H )+ + E(Y H,H ) = H 1 H i. i=1 In our case, we wish to observe h out of H hosts, so E(X h,h ) = E(Y 1,H )+E(Y 2,H )+ + E(Y h,h ) = H[lnH ln(h h)] = O(Hln H H h ) discovery phase stable phase Figure 3. Number of DNS queries needed to find a given number of unique IP addresses for FF domain Figure 4. detection Analytical model: (H/14)ln[H/(H-h)] FF domain ffdomain3.eu FF domain ffdomain2.eu FF domain ffdomain1.tk Linear model:.1h Approximation of number of DNS queries for FF domain If the observation is based on a single DNS server, e.g., local DNS queries are generated for a suspect domain at an average rate of ρ queries per unit time, then the expected time to detect a sufficient number of unique IP addresses to consider the domain a FF domain is T = O( H ρ ln H H h ). To validate this analytical model, we have shown in Figure 4 our proposed model against the actual number of queries required for three different FF domains. We observed that our model ( H ρ ln H H h, where ρ =14and H = 11) provides an upper bound on the number of queries required. As shown in Figure 4, the queries needed for these real life FF domains falls between a linear model and our analytical model, which indicates that the discovery phase is a mix of round-robin (linear model) and random sampling. As proposed in [28], we have the potential to reduce the time required to detect at least h unique IP addresses by combining query results from different DNS servers. Namely, if we have m DNS servers, and each are queried at an average rate ρ, then by correlating their results, the expected time T required for detection becomes T = O( H ρm ln H H h ), i.e., the theoretical speed-up in detection time is proportional to the number of DNS servers that participate in
5 JOURNAL OF NETWORKS, VOL. 4, NO. 1, FEBRUARY monitoring the suspect domain. In the following sections we consider different approaches for correlating evidence from multiple sources about FF domains. IV. CORRELATING EVIDENCE OF FAST FLUX PHISHING DOMAINS The speed of FF domain detection is limited by the frequency with which a single site will see new IP addresses being mapped to the suspect domain. In order to address the limitations of using a single point of detection, we propose two correlation approaches for FF domains detection, in terms of correlating results (1) from different DNS servers; (2) from different suspect FF domains. In each case, we consider empirical evidence from actual FF phishing domains to validate our approaches. A. Correlating Evidence from Multiple DNS Servers The motivations for this approach are as follows: If different DNS servers see different results for the same DNS query, then there is a benefit in combining evidence from multiple DNS servers. As described in Section III, there is potentially a linear speed-up in detection time when we increase the number of DNS servers that participate in monitoring the suspect domain, based on our analytical model (a) Query results from a DNS server in Brazil (b) Query results from a DNS server in Switzerland Figure. DNS queries of FF domain We focus our study on the discovery phase of the FF front-end proxy deployment. Figure plots sample DNS query results of a FF domain that we collected simultaneously from two different DNS servers: one in Brazil and another in Switzerland. Query results from both DNS servers have a similar trend in the number of unique IP addresses identified in the discovery phase. As shown in Figure (a) the DNS server in Brazil reported that 14 unique IP addresses were assigned to FF domain in the first query, and 117 unique IP addresses after 2 queries. Similar behavior can be observed from the DNS server in Switzerland. TABLE II. SAMPLE DNS QUERY RESULTS FROM A DNS SERVER IN BRAZIL TABLE III. SAMPLE DNS QUERY RESULTS FROM A DNS SERVER IN SWITZERLAND ;; ANSWER SECTION: ;; ANSWER SECTION: ffdomain3.eu. 6 IN A ffdomain3.eu. 6 IN A ffdomain3.eu. 6 IN A ffdomain3.eu. 6 IN A ffdomain3.eu. 6 IN A ffdomain3.eu. 6 IN A ffdomain3.eu. 6 IN A ffdomain3.eu. 6 IN A ffdomain3.eu. 6 IN A ffdomain3.eu. 6 IN A ffdomain3.eu. 6 IN A ffdomain3.eu. 6 IN A ffdomain3.eu. 6 IN A ffdomain3.eu. 6 IN A ffdomain3.eu. 6 IN A ffdomain3.eu. 6 IN A ffdomain3.eu. 6 IN A ffdomain3.eu. 6 IN A ffdomain3.eu. 6 IN A ffdomain3.eu. 6 IN A ffdomain3.eu. 6 IN A ffdomain3.eu. 6 IN A ffdomain3.eu. 6 IN A ffdomain3.eu. 6 IN A ffdomain3.eu. 6 IN A ffdomain3.eu. 6 IN A ffdomain3.eu. 6 IN A ffdomain3.eu. 6 IN A Figure shows a scenario where each DNS server works independently to detect the FF domain. If we can combine the results from both DNS servers, intuitively we could gather more evidence of the FF domain, and hence potentially speed up detection. However, the reduction in the detection time depends on the extent to which queries from different servers are independent or uncorrelated. Tables II and III show the results of a sample DNS query for the FF domain generated simultaneously on two different sites. In this example, 6 IP addresses were reported by both sites. Motivated by this example, we formalize the correlation scheme as follows. We consider a set of DNS servers D = {d i i =1, 2,...,m} which come from different network domains or different ISPs. Each DNS server d i issues queries at an average rate ρ for a suspect FF domain f, and correlates their results to gather evidence of potentially suspicious FF domains. The DNS servers collaborate to share the evidence they have collected. The evidence that is shared can potentially take many forms. We propose a correlation scheme based on the DNS A records (i.e., a set of suspicious IP addresses that are potentially being compromised) that are associated with the FF domain f. We refer to the set of suspicious IP addresses that have been observed by DNS server d i as domain f s proxy list (PL), i.e., PL i = {s ij IP j =1, 2,...,n i }, where s ij is the j th IP address that has been associated with domain f as seen by DNS server d i. Consider the case where all participating DNS servers correlate their proxy lists for domain f after each query. We denote the resulting proxy list of domain f after t queries (or being correlated t times) as the combined
6 8 JOURNAL OF NETWORKS, VOL. 4, NO. 1, FEBRUARY 29 proxy list (CPL), i.e., CPL t = CPL t 1 PL 1 PL 2... PL m. Hence, the number of unique IP addresses identified after t queries is h t = CPL t. In order to evaluate the effect of correlating evidence from multiple DNS servers, we continuously monitored several actual FF domains, which used the Danmec/Asprox SQL injection attack tool [22] for two weeks in August 28, from seven different sites on Planet- Lab [2] across three continents. In particular, we generated DNS queries every 1 minutes for monitored FF domains on seven DNS servers simultaneously. The DNS servers were selected to provide geographical diversity, and are from Brazil, United States, Russia, Singapore, Australia, Switzerland and Netherlands. TABLE IV. SAMPLE DNS QUERY RESULTS OF FF DOMAIN TABLE V. SAMPLE DNS QUERY RESULTS OF FF DOMAIN ;; ANSWER SECTION: ;; ANSWER SECTION: ffdomain1.tk. 6 IN A ffdomain2.eu. 6 IN A ffdomain1.tk. 6 IN A ffdomain2.eu. 6 IN A ffdomain1.tk. 6 IN A ffdomain2.eu. 6 IN A ffdomain1.tk. 6 IN A ffdomain2.eu. 6 IN A ffdomain1.tk. 6 IN A ffdomain2.eu. 6 IN A ffdomain1.tk. 6 IN A ffdomain2.eu. 6 IN A ffdomain1.tk. 6 IN A ffdomain2.eu. 6 IN A ffdomain1.tk. 6 IN A ffdomain2.eu. 6 IN A ffdomain1.tk. 6 IN A ffdomain2.eu. 6 IN A ffdomain1.tk. 6 IN A ffdomain2.eu. 6 IN A ffdomain1.tk. 6 IN A ffdomain2.eu. 6 IN A ffdomain1.tk. 6 IN A ffdomain2.eu. 6 IN A ffdomain1.tk. 6 IN A ffdomain2.eu. 6 IN A ffdomain1.tk. 6 IN A ffdomain2.eu. 6 IN A Figure 6 shows the correlation results in the discovery phase of a FF domain across seven different DNS servers. Figure 6 plots both the individual results PL i and the correlation results CPL for the FF domain in terms of the number of unique IP addresses that can be identified for a given number of queries. As shown in Figure 6, the individual DNS servers require a similar number of DNS queries in order to detect a given number of unique IP addresses from the FF domain. In comparison, the correlated results are consistently able to identify a given number of unique IP addresses using fewer DNS queries, e.g., we can detect 1 unique IP addresses using only 9 queries based on the correlated results, compared with up to 17 queries in the worst case for the individual servers. Similar results were achieved for other FF domains in both individual and correlation cases. Note that the speed-up in detection is sub-linear, rather than linear as discussed in Section III for the ideal case, since the query results from each DNS server are not fully independent. B. Correlating Evidence from Multiple FF Domains During our large-scale monitoring of FF domains, we made an interesting observation about the use of FF service networks. We observed that multiple FF domains use the same pool of IP addresses in their FF service DNS server in Australia DNS server in Brazil DNS server in US DNS server in Russia DNS server in Singapore DNS server in Netherlands DNS server in Switzerland Correlated report Figure 6. Effect of DNS query correlation from seven DNS servers network. As shown in Figure 7, two different FF domains observed from a single DNS server have almost identical behavior in terms of the number of unique IP addresses identified during 48 queries. Further testing highlighted that there was a significant overlap in the IP addresses used. As shown in Tables IV and V, 11 out of 14 IP addresses for a single query are identical between these two domains. The example shows that both FF domains are using the same group of IP addresses as their FF proxies. This indicates that either both domains are controlled by the same attacker, or the same FF service network is being rented out to host multiple FF domains. To the best of our knowledge, this use of a common FF service network for multiple domains has not been reported in the literature (a) Query results of FF domain (b) Query results of FF domain Figure 7. DNS queries of two different FF domains from a single DNS server We found that this characteristic of the same IP addresses being used in multiple FF domains can also be observed in data that was collected in June 28 by the
7 JOURNAL OF NETWORKS, VOL. 4, NO. 1, FEBRUARY University Mannheim, Germany [1]. Motivated by these observations, we propose a model of FF domain detection using a single DNS server as follows. If we see a potentially suspicious domain, but we lack sufficient evidence for confirmation, then if some of the IP addresses have already appeared in other FF domain names, we can speed up the confirmation process. We formalize our correlation scheme as follows. We consider a set of FF domains F = {f i i =1, 2,...,m} are monitored by a single DNS server. Each FF domain f i is queried at an average rate ρ, and we correlate their results, in order to gather evidence of potentially suspicious FF proxies. In this case, we propose a correlation scheme based on the DNS A records (i.e., a set of suspicious IP addresses that are potentially being compromised) that are associated with the FF domain f. We refer to the set of suspicious IP addresses that have been observed by the DNS server d i as domain f i s proxy list (PL), i.e., PL i = {s ij IP j =1, 2,...,n i }, where s ij is the j th IP address that has been associated with domain f i. We correlate the proxy lists of all potential FF domains after each query. We denote the resulting proxy list of all monitored suspect domains F after t queries (or being correlated t times) as the combined proxy list (CPL), i.e., CPL t = CPL t 1 PL 1 PL 2... PL m. Hence, the number of unique IP addresses identified after t queries is h t = CPL t. The key difference between this FF domain based correlation scheme and the DNS based correlation scheme is that this scheme correlates the IP address for multiple different FF domains from a single DNS server, while the DNS based correlation scheme correlates the IP address for a single FF domain from multiple DNS servers. In order to evaluate the effect of correlating evidence from multiple FF domains, we plot the correlation results of DNS queries of three actual FF domains collected on PlanetLab in Figure 8(a), and the correlation results of DNS queries of seventeen FF domains collected by [1] in Figure 8(b). Both figures only plot the first 2 queries, i.e., the discovery phase of the FF proxy deployment. Figure 8(a) plots both the individual results and correlation results for three different FF domains in terms of the number of queries required to identify a given number of unique IP addresses. As shown in Figure 8(a), the individual FF domains have similar detection performance. In contrast, the results from the correlation scheme consistently outperform the results from the individual FF domains, with approximately 3% fewer queries needed to identify the same number of hosts. Figure 8(b) plots the correlation results of seventeen different FF domains. In this case, the results from the correlated scheme can detect far more unique IP addresses than any single domain in isolation. Furthermore, any new domain that uses an IP address from the correlation results can immediately be treated as suspicious FF domain ffdomain1.tk FF domain ffdomain2.eu FF domain ffdomain3.eu Correlated report (a) Correlation results on PlanetLab FF domain ffdomain6.com FF domain ffdomain7.com FF domain ffdomain8.com FF domain ffdomain9.com FF domain ffdomain1.com FF domain ffdomain11.com FF domain ffdomain12.com FF domain ffdomain13.com FF domain ffdomain14.com FF domain ffdomain1.com FF domain ffdomain4.com FF domain ffdomain6.com FF domain ffdomain16.com FF domain ffdomain17.com FF domain ffdomain18.com Correlated report (b) Correlation results of data collected by [1] Figure 8. Effect of DNS query correlation from different FF domains V. SCALABLE PLATFORM FOR CORRELATION OF EVIDENCE Having proposed two correlation approaches to detect FF domains, we now consider how these approaches can be implemented in practice. Intuitively, an easy approach to collaborative detection is to use a centralized server to correlate all information. In this approach, each IDS monitors queries from its local DNS, then the query results are reported to a central server, which correlates all the reported query results. However, this centralized approach can introduce a central point of failure and poor scalability. Therefore, rather than relying on a centralized correlation platform, we need to support distributed correlation in a scalable manner with little management overhead. Previously, we have developed a general platform for collaborative correlation, called LarSID [27]. In this section, we describe how the correlation problems in Section IV can be mapped onto the LarSID architecture. A. Correlation Problems We are addressing two correlation problems in this paper: (1) correlation from multiple DNSs, and (2) correlation from multiple suspect FF domains. In the first correlation problem, each participating IDS queries its local DNS for suspect FF domains F = {f k k =1, 2,...,r} simultaneously. After each query,
8 82 JOURNAL OF NETWORKS, VOL. 4, NO. 1, FEBRUARY 29 Detection Unit underlying peer-to-peer network Detection Unit Correlation Unit Correlation Unit Figure 9. LarSID Architecture ( and are two separate processes in the participating IDS) each participant shares their query results in the form of f k,pl i, where PL i is a list of IP addresses that are associated with f k detected by participant IDS d i, i.e., PL i = {s ij IP j =1, 2,...,n i }. The suspect FF domain name f k is used as a key for correlation. All corresponding reported lists of IP addresses are aggregated to produce a global set of evidence statistics for the suspect domain. In the second correlation problem, the source of data is the same as in the first correlation problem, i.e., all the DNS query results reported by the participating IDSs. In this case, these results are shared in the form of s k,fl i, where s k is a suspicious IP address, i.e., S = {s k IP i =1, 2,...,r}, and FL i is a list of suspect FF domains that are associated with s k detected by participant IDS d i, i.e., FL i = {f ij j =1, 2,...,n i }. The suspicious IP address s k is used as a key for correlation. All corresponding reported lists of FF domains are aggregated to produce global evidence for s k. B. Distributed Correlation Algorithms In order to support the distributed correlation, we use LarSID, a collaborative intrusion detection architecture proposed in our previous work [27], as shown in Figure 9. In LarSID, each participant IDS has two functional units, a detection unit that is responsible for collecting alerts locally; and a correlation unit that is a part of the distributed correlate-and-filter scheme. LarSID comprises a set of IDSs D = {d i i =1, 2,...,m}. Each detection system d i queries its local DNS for suspect FF domains F, in order to gather evidence of potentially suspicious activities. All of these intrusion detection systems are connected by the LarSID architecture and share information with each other. Periodically, each detection system shares evidence about either the suspect FF domains (first correlation problem) or the suspicious IP addresses (second correlation problem) seen on its local DNS. In order to achieve collaboration between the participant IDSs, LarSID uses a peer-to-peer publish-subscribe mechanism for sharing evidence. Each participant d i shares the contents of its query results via a publishsubscribe process, which takes place periodically after each query with a time interval. We explain how each correlation problem (multiple DNS servers or suspected FF domains) can be mapped onto LarSID as follows. In the first correlation problem, at the end of each period, each detection system d i Dsubscribes to information about suspect FF domain f k,pl i detected from the local DNS. If this suspect domain f k is confirmed as a FF domain by LarSID after correlating all related PLs, then d i is notified about this domain f k, as well as related information such as the number of unique IP addresses associated with it. The detection system d i can then take further action based on the information received about the globally confirmed FF domain. In the second correlation problem, at the end of each period, each detection system d i Dsubscribes to information about suspicious IP address s k,pl i detected from the local DNS. If this suspicious IP address s k is confirmed as a FF front-end proxy by LarSID after correlating all related FLs, then d i is notified about this IP address s k, as well as related information such as the number of FF domains associated with it. The detection system d i can then take further action. C. Performance Evaluation Note that decentralized systems introduce additional communication overhead due to distributed message routing in comparison to a centralized approach. It is essential to quantify whether this increase in communication overhead outweighs any savings in computational load. In order to measure the performance of the proposed distributed correlation schemes in LarSID, we have previously implemented a simple correlation scheme on LarSID [27]. In this implementation, we correlated suspicious evidence based on the source IP address only. This is representative of the proposed correlation scheme. We measured the time required for subscription and information correlation in comparison to a centralized collaborative intrusion detection system (CIDS), based on a deployment of LarSID on PlanetLab. We measured the performance of our decentralized architecture in comparison to a centralized CIDS, which uses the same detection mechanism as the decentralized architecture. The experimental results of the performance of LarSID with the source IP based correlation scheme were reported in [27]. The traffic used was from a different attack scenarios, i.e., the scanning behavior of sources during worm outbreaks. However, the underlying correlation task is the same as the proposed algorithm, and the results are indicative of the performance that can be expected for large-scale source address correlation. To summarize the results from [27], we found that the average subscription delay on the decentralized version of
9 JOURNAL OF NETWORKS, VOL. 4, NO. 1, FEBRUARY LarSID was 16 to 1, times faster than the corresponding delay on the centralized LarSID, where the speedup increased as the number of participants in LarSID increased. This is because when more participants join the collaborative framework, the increase in queuing delay on the centralized server is far higher than the increase in the routing delay on the decentralized CIDS. VI. RELATED WORK Our study is related to two main areas of research: anti-phishing and collaborative intrusion detection. In this section, we provide a brief review of the relevant approaches and techniques in the literature. A. Anti-phishing Approaches Miyamoto et al. [17] proposed a filtering algorithm to defeat phishing attacks. They protect novice users from web phishing attacks by removing part of the content that traps users into entering their personal information. This approach is client-based webpage filtering, while our approach is phishing website trace-back. Liu et al. [13] proposed an approach for server operators to automatically detect phishing webpages based on visual similarity. This approach focuses on detecting fraudulent sites by comparing the webpages, while our approach is to identify the phishing website hosts by correlating suspicious traffic patterns. Due to their limited lifetime, phishing websites attempt to gain the trust of their users and convince them to act quickly. Drake et al. [] discussed numerous tricks employed by phishing scammers, in order to understand the psychological processes behind phishing attacks. There are a variety of anti-phishing tools that have been proposed to prevent users from disclosing their personal information, such as Cloudmark Anti-Fraud Toolbar [3], ebay Toolbar [6] and SpoofGuard [2]. However, based on a recent study conducted by Zhang et al. [26], the best tool among 1 popular anti-phishing tools tested can achieve more than 9% detection rate, but with 42% false positives. Furthermore, many users tend to ignore any warnings provided by anti-phishing tools [21], [24]. McGrath et al. [1] examined the operational aspects of phishing. ICANN [11] published an advisory which indicated FF is increasingly used to host phishing attacks. Moore et al. [18] examined the impact of phishing website take-down, and found the average life time of phishing domains was extended by using FF hosting. Holz et al. [9] proposed a similar work on FF network detection and measurement. They developed a metric for detecting FF domains based on three parameters that are similar to our detection characteristics. However, their approach and evaluation are based on a single point of observation. In contrast, our approach focuses on the collaboration between multiple observation points. B. Collaborative Intrusion Detection Locasto et al. [14] proposed a fully distributed CIDS based on a P2P architecture. Each participant uses an IDS to monitor its subnetwork or hosts. A tool called Worminator is run on the participating hosts at specified intervals to parse the alert output of the local IDS into the form of a watchlist (a list of suspicious IP addresses). Next, the encoded watchlists are distributed over a decentralized P2P-style network among the participants. The DOMINO project [19], [2] is a distributed CIDS that aims to monitor Internet-scale outbreaks. The nodes in DOMINO are connected using a P2P protocol, and they participate in a periodic exchange of intrusion information. However, the DOMINO system has not been evaluated in a large-scale deployment. Dash et al. [4] proposed a collaborative system of hostbased IDSs, which use distributed probabilistic inference to detect slow network intrusions. A gossip protocol is used to communicate state between detection systems. A global view of the current security status of the monitored system is generated by analyzing local state information using a probabilistic detector model. VII. CONCLUSION In conclusion, FF domains are extremely difficult to detect in a timely and accurately manner, due to the use of a screen of proxies to shield the FF mothership. We present a theoretical model to analyze the FF detection problem by quantifying the number of DNS queries needed to retrieve a certain number of unique IP addresses. Our analytical model identifies an upper bound on the expected time required to detect a sufficient number of unique IP addresses to confirm a FF domain, and the theoretical speed-up for cooperation between multiple DNS severs. We then propose two approaches to correlating evidence from multiple DNS servers and from multiple suspect FF domains to speed-up FF domain detection. Our experimental results on real-world data show that a substantial speed-up in the number of queries needed for FF domain detection can be achieved. We finally discuss the implementation of our proposed correlation schemes in practice by using a decentralized correlation architecture called LarSID, as experimental results have shown that this decentralized correlation architecture is more scalable than a fully centralized architecture. ACKNOWLEDGMENT We thank the Laboratory of Dependable Distributed Systems in the University Mannheim, Germany for making their Fast Flux data available. This research was supported by the Australian Research Council. REFERENCES [1] Anti-Phishing Working Group. [Online]. Available: [2] N. Chou, R. Ledesma, Y. Teraguchi, D. Boneh, and J. Mitchell, Client-side defense against web-based identity theft, in Proceedings of Network and Distributed Systems Security (NDSS), 24. [3] Cloudmark Inc. [Online]. Available:
10 84 JOURNAL OF NETWORKS, VOL. 4, NO. 1, FEBRUARY 29 [4] D. Dash, B. Kveton, J. Agosta, E. Schooler, J. Chandrashekar, A. Bachrach, and A. Newman, When gossip is good: Distributed probabilistic inference for detection of slow network intrusions, in Proceedings of the Twenty- First National Conference on Artificial Intelligence (AAAI), 26, pp [] C. Drake, J. Oliver, and E. Koontz, Anatomy of a Phishing , Proceedings of the First Conference on and Anti-Spam (CEAS), 24. [6] ebay Inc., Using ebay Tool s Account Guard. [Online]. Available: [7] Gartner Inc., Gartner Says Number of Phishing s Sent to U.S. Adults Nearly Doubles in Just Two Years, 26 Press Release, 9 Nov 26. [Online]. Available: [8] Gartner Inc., Gartner Survey Shows Phishing Attacks Escalated in 27. [Online]. Available: [9] T. Holz, C. Gorecki, K. Rieck, and F. Freiling, Measuring and Detecting Fast-Flux Service Networks, in Proceedings of the 1th Annual Network and Distributed System Security Symposium (NDSS8), 28. [1] T. Holz, Fast Flux research data in the Laboratory of Dependable Distributed Systems in the University Mannheim, Germany, 28. [Online]. Available: mannheim.de/index.php?pagecontent=site/research.menu/fast- Flux.page [11] ICANN Security and Stability Advisory Committee, SAC advisory on fast flux hosting and DNS, January 28. [Online]. Available: [12] M. Jakobsson and S. Myers, Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft. Wiley-Interscience, 26. [13] W. Liu, G. Huang, X. Liu, M. Z, and X. Deng, Detection of phishing webpages based on visual similarity, International World Wide Web Conference, pp , 2. [14] M. Locasto, J. Parekh, A. Keromytis, and S. Stolfo, Towards Collaborative Security and P2P Intrusion Detection, in Proceedings of the 2 IEEE Workshop on Information Assurance and Security, 2, pp [1] D. McGrath and M. Gupta, Behind Phishing: An Examination of Phisher Modi Operandi, in Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, 28. [16] M. Mitzenmacher and E. Upfal, Probability and Computing: Randomized Algorithms And Probabilistic Analysis. Cambridge University Press, 2. [17] D. Miyamoto, H. Hazeyama, and Y. Kadobayashi, SPS: a simple filtering algorithm to thwart phishing attacks, in Proceedings of Technologies for Advanced Heterogeneous Networks, vol. 3837, 2, pp [18] T. Moore and R. Clayton, Examining the impact of website take-down on phishing, Proceedings of the Anti- Phishing Working Groups 2nd Annual ecrime Researchers Summit, pp. 1 13, 27. [19] V. Y. P. Barford, S. Jha, Fusion and filtering in distributed intrusion detection systems, in Proceedings of Annual Allerton Conference on Communication, Control and Computing, September 24. [2] Princeton University, PlanetLab Testbed. [Online]. Available: [21] S. E. Schechter, R. Dhamija, A. Ozment, and I. Fischer, The Emperor s New Security Indicators, in SP 7: Proceedings of the 27 IEEE Symposium on Security and Privacy, 27, pp [22] J. Stewart, Danmec/Asprox SQL Injection Attack Tool Analysis, May 13, 28. [Online]. Available: [23] The Honeynet Project & Research Alliance, Know Your Enemy: Fast-Flux Service Networks, 27. [Online]. Available: [24] M. Wu, R. Miller, and S. Garfinkel, Do security toolbars actually prevent phishing attacks? Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp , 26. [2] V. Yegneswaran, P. Barford, and S. Jha, Global Intrusion Detection in the DOMINO Overlay System, in Proceedings of Network and Distributed Security Symposium (NDSS), 24. [26] Y. Zhang, S. Egelman, L. Cranor, and J. Hong, Phinding Phish: Evaluating Anti-Phishing Tools, Proceedings of the 14th Annual Network and Distributed System Security Symposium (NDSS 27), San Diego, CA, vol. 28, 27. [27] C. V. Zhou, S. Karunasekera, and C. Leckie, Evaluation of a Decentralized Architecture for Large Scale Collaborative Intrusion Detection, in Proceedings of the Tenth IFIP/IEEE International Symposium on Integrated Network Management (IM), Germany, 27, pp [28] C. V. Zhou, C. Leckie, S. Karunasekera, and T. Peng, A self-healing, self-protecting collaborative intrusion detection architecture to trace-back fast-flux phishing domains, in Proceedings of the 2nd IEEE Workshop on Autonomic Communication and Network Management (ACNM 28), April 28. Chenfeng Vincent Zhou received his Ph.D. in computer science from the University of Melbourne, Australia, in 29. He is currently a Research Fellow at The University of Melbourne. He is a Certified Information Systems Security Professional (CISSP) since 28. His research interests include computer security, network management and distributed systems. Christopher Leckie is an Associate Professor in the Department of Computer Science and Software Engineering at the University of Melbourne, Australia. His research interests include using data mining and other artificial intelligence techniques for network intrusion detection and network management, as well as the management of sensor networks. Prior to joining the University of Melbourne, he was a Principal Engineer at Telstra Research Laboratories, where he conducted research and development into artificial intelligence techniques for various telecommunication applications. Shanika Karunasekera received the B.Sc (Honours) degree in electronics and telecommunications engineering from the University of Moratuwa, Sri Lanka, in 199 and the Ph.D. degree in electrical engineering from the University of Cambridge, UK, in 199. From 199 to 22, she was a Software Engineer and a Distinguished Member of Technical Staff at Lucent Technologies, Bell Labs Innovations, USA. Since January 23, she has been a Senior Lecturer at the Department of Computer Science and Software Engineering, University of Melbourne. Her current research interests are distributed computing, software engineering and peer-to-peer computing. Dr Karunasekera is a member of the ACM.
New Trends in FastFlux Networks
New Trends in FastFlux Networks Wei Xu 408-753-4135 [email protected] Huagang Xie 408-753-4109 [email protected] Xinran Wang 408-753-4108 [email protected] ABSTRACT Fast-flux
An Empirical Analysis of Malware Blacklists
An Empirical Analysis of Malware Blacklists Marc Kührer and Thorsten Holz Chair for Systems Security Ruhr-University Bochum, Germany Abstract Besides all the advantages and reliefs the Internet brought
Bypassing Security Toolbars and Phishing Filters via DNS Poisoning
Bypassing Security Toolbars and Phishing Filters via DNS Poisoning Saeed Abu-Nimeh and Suku Nair SMU HACNet Lab Computer Science and Engineering Dept. Southern Methodist University Dallas, TX 75275 {sabunime,
Anti-Phishing Best Practices for ISPs and Mailbox Providers
Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
Layered security in authentication. An effective defense against Phishing and Pharming
1 Layered security in authentication. An effective defense against Phishing and Pharming The most widely used authentication method is the username and password. The advantages in usability for users offered
Intelligent Worms: Searching for Preys
Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],
Anti-Phishing Security Strategy. Angelo P. E. Rosiello
Anti-Phishing Security Strategy Angelo P. E. Rosiello Agenda 1. Brief introduction to phishing 2. Strategic defense techniques 3. A new client based solution: DOMAntiPhish 4. Conclusions Nature of Phishing
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
Dynamics of Online Scam Hosting Infrastructure
Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster, and Jaeyeon Jung 2 Georgia Institute of Technology 2 Intel Research {mkonte,feamster}@cc.gatech.edu, [email protected] Abstract.
Quarterly Report: Symantec Intelligence Quarterly
Symantec Intelligence Quarterly: Best Practices and Methodologies Quarterly Report: Symantec Intelligence Quarterly Symantec Intelligence Quarterly: Best Practices and Methodologies Contents Symantec
Double guard: Detecting Interruptions in N- Tier Web Applications
Vol. 3, Issue. 4, Jul - Aug. 2013 pp-2014-2018 ISSN: 2249-6645 Double guard: Detecting Interruptions in N- Tier Web Applications P. Krishna Reddy 1, T. Manjula 2, D. Srujan Chandra Reddy 3, T. Dayakar
A PHISHING MODEL AND ITS APPLICATIONS TO EVALUATING PHISHING ATTACKS
A PHISHING MODEL AND ITS APPLICATIONS TO EVALUATING PHISHING ATTACKS Narasimha Shashidhar and Lei Chen Sam Houston State University, Huntsville, TX, USA [email protected], [email protected] Abstract Phishing
Phishing Activity Trends Report for the Month of December, 2007
Phishing Activity Trends Report for the Month of December, 2007 Summarization of December Report Findings The total number of unique phishing reports submitted to APWG in December 2007 was 25,683, a decrease
The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015
The Cost of Phishing Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 Executive Summary.... 3 The Costs... 4 How To Estimate the Cost of an Attack.... 5 Table
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks
White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content even
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA Email {wei.xu, ksanders, yzhang}@ paloaltonetworks.com ABSTRACT Malicious domains
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Prevention, Detection and Mitigation of DDoS Attacks. Randall Lewis MS Cybersecurity
Prevention, Detection and Mitigation of DDoS Attacks Randall Lewis MS Cybersecurity DDoS or Distributed Denial-of-Service Attacks happens when an attacker sends a number of packets to a target machine.
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Protecting Users Against Phishing Attacks
c The Author 2005. Published by Oxford University Press on behalf of The British Computer Society. All rights reserved. For Permissions, please email: [email protected] doi:10.1093/comjnl/bxh000
FAQ (Frequently Asked Questions)
FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias
Collaborative Intrusion Detection Networks and Insider Attacks
University of Waterloo Waterloo, ON, Canada [email protected] Abstract Cyber intrusion is becoming an increasingly global and urgent problem. Intrusion Detection Systems (IDSs) are deployed to identify
A Hybrid Approach to Detect Zero Day Phishing Websites
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 17 (2014), pp. 1761-1770 International Research Publications House http://www. irphouse.com A Hybrid Approach
Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs
Decoding DNS data Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs The Domain Name System (DNS) is a core component of the Internet infrastructure,
SAC 025 SSAC Advisory on Fast Flux Hosting and DNS
Fast and Double Flux Attacks 1 SAC 025 SSAC Advisory on Fast Flux Hosting and DNS An Advisory from the ICANN Security and Stability Advisory Committee (SSAC) January 2008 Fast and Double Flux Attacks 2
Security issues in mobile banking using cloud based services
RESEARCH ARTICLE OPEN ACCESS Security issues in mobile banking using cloud based services *Mr. P. Gurava Reddy, **Dr. M. Ashok Assoc. Professor, Dept. of CSE,CMREC., Principal, SSJEC, hyd. E-Mail: [email protected],
LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages
LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,
Domain Name Abuse Detection. Liming Wang
Domain Name Abuse Detection Liming Wang Outline 1 Domain Name Abuse Work Overview 2 Anti-phishing Research Work 3 Chinese Domain Similarity Detection 4 Other Abuse detection ti 5 System Information 2 Why?
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security
Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content
Zscaler Internet Security Frequently Asked Questions
Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices
DDoS Vulnerability Analysis of Bittorrent Protocol
DDoS Vulnerability Analysis of Bittorrent Protocol Ka Cheung Sia [email protected] Abstract Bittorrent (BT) traffic had been reported to contribute to 3% of the Internet traffic nowadays and the number
Internet Anonymity and the Design Process - A Practical Approach
anon.next: A Framework for Privacy in the Next Generation Internet Matthew Wright Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA, [email protected],
10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
Large-Scale IP Traceback in High-Speed Internet
2004 IEEE Symposium on Security and Privacy Large-Scale IP Traceback in High-Speed Internet Jun (Jim) Xu Networking & Telecommunications Group College of Computing Georgia Institute of Technology (Joint
Index Terms Denial-of-Service Attack, Intrusion Prevention System, Internet Service Provider. Fig.1.Single IPS System
Detection of DDoS Attack Using Virtual Security N.Hanusuyakrish, D.Kapil, P.Manimekala, M.Prakash Abstract Distributed Denial-of-Service attack (DDoS attack) is a machine which makes the network resource
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.
Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech
Measures to Protect (University) Domain Registrations and DNS Against Attacks. Dave Piscitello, ICANN [email protected]
Measures to Protect (University) Domain Registrations and DNS Against Attacks Dave Piscitello, ICANN [email protected] Why are we talking about Domain names and DNS? Domain names and URLs define
How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme
Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi
Defending Against. Phishing Attacks
Defending Against Today s Targeted Phishing Attacks DeFending Against today s targeted phishing attacks 2 Introduction Is this email a phish or is it legitimate? That s the question that employees and
Streamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
Detection and Controlling of DDoS Attacks by a Collaborative Protection Network
Detection and Controlling of DDoS Attacks by a Collaborative Protection Network Anu Johnson 1, Bhuvaneswari.P 2 PG Scholar, Dept. of C.S.E, Anna University, Hindusthan Institute of Technology, Coimbatore,
Distributed Denial of Service Attack Tools
Distributed Denial of Service Attack Tools Introduction: Distributed Denial of Service Attack Tools Internet Security Systems (ISS) has identified a number of distributed denial of service tools readily
EVILSEED: A Guided Approach to Finding Malicious Web Pages
+ EVILSEED: A Guided Approach to Finding Malicious Web Pages Presented by: Alaa Hassan Supervised by: Dr. Tom Chothia + Outline Introduction Introducing EVILSEED. EVILSEED Architecture. Effectiveness of
Malicious Network Traffic Analysis
Malicious Network Traffic Analysis Uncover system intrusions by identifying malicious network activity. There are a tremendous amount of network based attacks to be aware of on the internet today and the
A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
An Advanced Reputation Management Approach to Stopping Emerging Email Threats
An Advanced Reputation Management Approach to Stopping Emerging Email Threats CONTENTS The Evolution of Reputation Management 2 Emerging Security Threats 2 Advanced Reputation Management (ARM) 3 How ARM
Global Reputation Monitoring The FortiGuard Security Intelligence Database WHITE PAPER
Global Reputation Monitoring The FortiGuard Security Intelligence Database WHITE PAPER FORTINET Global Reputation Monitoring PAGE 2 Overview Fortinet s FortiGuard Security Services delivers two essential
AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM. Dr. T.Ravichandran, B.E (ECE), M.E(CSE), Ph.D., MISTE.,
AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM K.Kungumaraj, M.Sc., B.L.I.S., M.Phil., Research Scholar, Principal, Karpagam University, Hindusthan Institute of Technology, Coimbatore
Protecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
highly predictive blacklisting
J i a n Z h a n g, P h i l l i p P o r r a s, a n d Johannes Ullrich highly predictive blacklisting Jian Zhang is an assistant professor in the department of computer science at Louisiana State University.
Conclusions and Future Directions
Chapter 9 This chapter summarizes the thesis with discussion of (a) the findings and the contributions to the state-of-the-art in the disciplines covered by this work, and (b) future work, those directions
B database Security - A Case Study
WHITE PAPER: ENTERPRISE SECURITY Strengthening Database Security White Paper: Enterprise Security Strengthening Database Security Contents Introduction........................................................................4
Dynamics of Online Scam Hosting Infrastructure
Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster, and Jaeyeon Jung 2 Georgia Institute of Technology 2 Intel Research {mkonte,feamster}@cc.gatech.edu, [email protected] Abstract.
Fast Flux Hosting and DNS ICANN SSAC
Fast Flux Hosting and DNS ICANN SSAC What is Fast Flux Hosting? An evasion technique Goal Avoid detection and take down of web sites used for illegal purposes Technique Host illegal content at many sites
Symantec enterprise security. Symantec Internet Security Threat Report April 2009. An important note about these statistics.
Symantec enterprise security Symantec Internet Security Threat Report April 00 Regional Data Sheet Latin America An important note about these statistics The statistics discussed in this document are based
First Line of Defense
First Line of Defense SecureWatch ANALYTICS FIRST LINE OF DEFENSE OVERVIEW KEY BENEFITS Comprehensive Visibility Powerful web-based security analytics portal with easy-to-read security dashboards Proactive
An Efficient Filter for Denial-of-Service Bandwidth Attacks
An Efficient Filter for Denial-of-Service Bandwidth Attacks Samuel Abdelsayed, David Glimsholt, Christopher Leckie, Simon Ryan and Samer Shami Department of Electrical and Electronic Engineering ARC Special
On A Network Forensics Model For Information Security
On A Network Forensics Model For Information Security Ren Wei School of Information, Zhongnan University of Economics and Law, Wuhan, 430064 [email protected] Abstract: The employment of a patchwork
WHITE PAPER. The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks
WHITE PAPER The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks A Cyveillance Report October 2008 EXECUTIVE SUMMARY How much do phishing attacks really cost organizations?
Index Terms Domain name, Firewall, Packet, Phishing, URL.
BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet
Implementation of Botcatch for Identifying Bot Infected Hosts
Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
An Efficient Methodology for Detecting Spam Using Spot System
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
First Line of Defense
First Line of Defense SecureWatch ANALYTICS FIRST LINE OF DEFENSE OVERVIEW KEY BENEFITS Comprehensive Visibility Gain comprehensive visibility into DDoS attacks and cyber-threats with easily accessible
GLOBAL SERVER LOAD BALANCING WITH SERVERIRON
APPLICATION NOTE GLOBAL SERVER LOAD BALANCING WITH SERVERIRON Growing Global Simply by connecting to the Internet, local businesses transform themselves into global ebusiness enterprises that span the
When visiting online banking's sign-on page, your browser establishes a secure session with our server.
The privacy of communications between you (your browser) and our servers is ensured via encryption. Encryption scrambles messages exchanged between your browser and our online banking server. How Encryption
Complete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
INTRUSION DECEPTION CZYLI BAW SIĘ W CIUCIUBABKĘ Z NAMI
INTRUSION DECEPTION CZYLI BAW SIĘ W CIUCIUBABKĘ Z NAMI Na przykładzie Junos WebApp Secure Edmund Asare INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations
DNS security: poisoning, attacks and mitigation
DNS security: poisoning, attacks and mitigation The Domain Name Service underpins our use of the Internet, but it has been proven to be flawed and open to attack. Richard Agar and Kenneth Paterson explain
INTRUSION PREVENTION AND EXPERT SYSTEMS
INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla [email protected] Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion
