Skip to main content
Article
Detecting Malware Domains: A Cyber-Threat Alarm System
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
  • Khalifa AlRoum, Zayed University
  • Abdulhakim Alolama, Zayed University
  • Rami Kamel, Zayed University
  • May El Barachi, University of Wollongong in Dubai
  • Monther Aldwairi, Zayed University
Document Type
Conference Proceeding
Publication Date
1-1-2018
Abstract

© 2018, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Throughout the years, hackers’ intentions’ varied from curiosity, to financial gains, to political statements. Armed with their botnets, bot masters could crash a server or website. Statistics show that botnet activity accounts for 29% of the Internet traffic. But how can bot masters establish undetected communication with their botnets? The answer lies in the Domain Name System (DNS), using which hackers host their own domain and assign to it changing IP addresses to avoid being detected. In this paper, we propose a multi-factor cyber-threat detection system that relies on DNS traffic analysis for the detection of malicious domains. The proposed system was implemented, and tested, and the results yielded are very promising.

ISBN
9783319678368
Publisher
Springer Verlag
Disciplines
Keywords
  • Botnets,
  • Cyber-threat,
  • DNS analysis,
  • Malicious domains’ detection
Scopus ID
85032703976
Indexed in Scopus
Yes
Open Access
No
https://doi.org/10.1007/978-3-319-67837-5_17
Citation Information
Khalifa AlRoum, Abdulhakim Alolama, Rami Kamel, May El Barachi, et al.. "Detecting Malware Domains: A Cyber-Threat Alarm System" Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST Vol. 206 (2018) p. 181 - 191 ISSN: <a href="https://v2.sherpa.ac.uk/id/publication/issn/1867-8211" target="_blank">1867-8211</a>
Available at: http://works.bepress.com/monther-aldwairi/19/