IEICE Transactions on Communications
Online ISSN : 1745-1345
Print ISSN : 0916-8516

この記事には本公開記事があります。本公開記事を参照してください。
引用する場合も本公開記事を引用してください。

Analysis of DNS TXT Record Usage and Consideration of Botnet Communication Detection
Hikaru ICHISEYong JINKatsuyoshi IIDA
著者情報
ジャーナル 認証あり 早期公開

論文ID: 2017ITP0009

この記事には本公開記事があります。
詳細
抄録

There have been several recent reports that botnet communication between bot-infected computers and Command and Control servers (C&C servers) using the Domain Name System (DNS) protocol has been used by many cyber attackers. In particular, botnet communication based on the DNS TXT record type has been observed in several kinds of botnet attack. Unfortunately, the DNS TXT record type has many forms of legitimate usage, such as hostname description. In this paper, in order to detect and block out botnet communication based on the DNS TXT record type, we first differentiate between legitimate and suspicious usages of the DNS TXT record type and then analyze real DNS TXT query data obtained from our campus network. We divide DNS queries sent out from an organization into three types ―via-resolver, and indirect and direct outbound queries― and analyze the DNS TXT query data separately. We use a 99-day dataset for via-resolver DNS TXT queries and an 87-day dataset for indirect and direct outbound DNS TXT queries. The results of our analysis show that about 30%, 8% and 19% of DNS TXT queries in via-resolver, indirect and direct outbound queries, respectively, could be identified as suspicious DNS traffic. Based on our analysis, we also consider a comprehensive botnet detection system and have designed a prototype system.

著者関連情報
© 2017 The Institute of Electronics, Information and Communication Engineers
feedback
Top