DNSradar: Outsourcing Malicious Domain Detection Based on Distributed Cache-Footprints
Document Type
Article
Publication Date
11-1-2014
Abstract
As the domain name system (DNS) plays a critical role in malicious services and number of networks, especially small enterprise networks and home networks that are generally and poorly managed, grows rapidly, it is highly desired to outsource the malicious domain detection service to a third-party system that can aggregate information from multiple vantage points to perform detection. To this end, we propose DNSRadar, a system that explores the coexistence of domain cache-footprints distributed in all networks that participate in the outsourcing service. Bootstrapping from a list of prelabeled malicious domains, DNSRadar leverages link analysis techniques to infer maliciousness likelihood of unknown domains based on coexistence information. As DNSRadar only uses the existence of an unknown domain in a network for detection, privacy concerns have been drastically reduced. Both MapReduce and lightweight matrix analysis techniques are employed to implement DNSRadar, making scalability as a built-in feature. Taking advantage of a large number of open recursive DNS servers, we have performed extensive evaluation at scale. Experimental results have demonstrated that DNSRadar can efficiently detect ∼90% malicious domains given a low false positive rate of 1%. Of all these detected malicious domains, ∼30% are on average 6 days earlier than public DNS reputation services, indicating DNSRadar's great early detection capability.
Repository Citation
Ma, X.,
Zhang, J.,
Tao, J.,
Li, J.,
Tian, J.,
& Guan, X.
(2014). DNSradar: Outsourcing Malicious Domain Detection Based on Distributed Cache-Footprints. IEEE Transactions on Information Forensics and Security, 9 (11), 1906-1921.
https://corescholar.libraries.wright.edu/cse/540
DOI
10.1109/TIFS.2014.2357251