Master Thesis as part of the major in Security & Privacy at the EIT Digital Master School SIDekICk SuspIcious DomaIn Classification

نویسنده

  • Moritz C. Müller
چکیده

The Domain Name System (DNS) plays a central role in the Internet. It allows the translation of human-readable domain names to (alpha-) numeric IP addresses in a fast and reliable manner. However, domain names not only allow Internet users to access benign services on the Internet but are used by hackers and other criminals as well, for example to host phishing campaigns, to distribute malware, and to coordinate botnets. Registry operators, which are managing top-level domains (TLD) like .com, .net or .nl, disapprove theses kinds of usage of their domain names because they could harm the reputation of their zone and would consequentially lead to loss of income and an insecure Internet as a whole. Up to today, only little research has been conducted with the intention to fight malicious domains from the view of a TLD registry. This master thesis focuses on the detection of malicious domain names for the .nl country code TLD. Therefore, we analyse the characteristics of known malicious .nl domains which have been used for phishing and by botnets. We confirm findings from previous research in .com and .net and evaluate novel characteristics including query patterns for domains in quarantine and recursive resolver relations. Based on this analysis, we have developed a prototype of a detection system called SIDekICk. It is able to detect newly registered phishing domains and other online scams as soon as they propagate through the Internet with a false positive rate of 0,3 percent. It relies solely on features that can be collected from the vantage point of any TLD registry like DNS query patterns, geographic features of querying resolvers, and domain registration information. A second component of SIDekICk reports suspicious domain names that were formerly used for benign purposes but might have been compromised to become part of a malware infection chain or a phishing campaign. This component demonstrates that DNS traffic analysis has the potential to detect compromised domains as well and in this thesis, we suggest additional features to improve the detection rate.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Sudy on Information Privacy Issue on Social Networks

In the recent years, social networks (SN) are now employed for communication and networking, socializing, marketing, as well as one’s daily life. Billions of people in the world are connected though various SN platforms and applications, which results in generating massive amount of data online. This includes personal data or Personally Identifiable Information (PII). While more and more data a...

متن کامل

Evaluating the quality of master degree thesis of Educational Psychology graduates

The purpose of the present research was to evaluate and identify the quality and the weaknesses and strengths of different sections of master's degree thesis in educational psychology at Tehran universities. The research method was evaluation and the statistical population included all the master's degree theses in the field of educational psychology at Tehran universities during the 2013-2016 ...

متن کامل

Applications of Factorization Theorem and Ontologies for Activity Modeling , Recognition and Anomaly Detection

Title of thesis: Applications of Factorization Theorem and Ontologies for Activity Modeling, Recognition and Anomaly Detection Umut Akdemir, Master of Science, 2005 Thesis directed by: Professor Rama Chellappa Department of Electrical and Computer Engineering Affiliate Professor in Department of Computer Science In this thesis two approaches for activity modeling and suspicious activity detecti...

متن کامل

An Investigation of Interactional Metadiscourse in Discussion and Conclusion Sections of Social and Natural Science Master Theses

This study is a corpus-based study of interactional metadiscourse in natural and social science master theses. For this purpose, 30 natural and social science master theses in six disciplines were randomly selected out of the library of five universities. Five master theses were selected in each discipline, in a period of six years (2010-2016).This study analyzed only the discussion and conclus...

متن کامل

Private Entity Authentication for Pervasive Computing Environments

Entity authentication becomes ubiquitously necessary in pervasive computing environments. We provide taxonomy of entity authentication between keys and locks. Based on the discussion, we propose a novel authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital keys for entity authentication. The Master Key initi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015