Computer Networks 100 (2016) 28–44
Contents lists available at ScienceDirect
Computer Networks
journal homepage: www.elsevier.com/locate/comnet
Mining agile DNS traffic using graph analysis for cybercrime
detection
Andreas Berger
a,∗
, Alessandro D’Alconzo
e
, Wilfried N. Gansterer
b
,
Antonio Pescapé
c,d
a
Telecommunications Research Center Vienna, Vienna, Austria
b
University of Vienna, Faculty of Computer Science, Vienna, Austria
c
Electrical Engineering and Information Technology Department of University of Napoli Federico II, Napoli, Italy
d
NM2 srl, Napoli, Italy
e
Austrian Institute of Technology, Vienna, Austria
a r t i c l e i n f o
Article history:
Received 30 April 2015
Revised 22 December 2015
Accepted 1 February 2016
Available online 15 February 2016
Keywords:
Cybercrime detection
Traffic analysis
DNS
Graph analysis
Network monitoring
a b s t r a c t
We consider the analysis of network traffic data for identifying highly agile DNS patterns
which are widely considered indicative for cybercrime. In contrast to related approaches,
our methodology is capable of explicitly distinguishing between the individual, inherent
agility of benign Internet services and criminal sites. Although some benign services use a
large number of addresses, they are confined to a subset of IP addresses, due to operational
requirements and contractual agreements with certain Content Distribution Networks. We
discuss DNSMap, a system which analyzes observed DNS traffic, and continuously learns
which FQDNs are hosted on which IP addresses. Any significant changes over time are
mapped to bipartite graphs, which are then further pruned for cybercrime activity. Graph
analysis enables the detection of transitive relations between FQDNs and IPs, and reveals
clusters of malicious FQDNs and IP addresses hosting them. We developed a prototype sys-
tem which is designed for realtime analysis, requires no costly classifier retraining, and no
excessive whitelisting. We evaluate our system using large data sets from an ISP with sev-
eral 100,000 customers, and demonstrate that even moderately agile criminal sites can be
detected reliably and almost immediately.
© 2016 Elsevier B.V. All rights reserved.
1. Introduction
A recent report by Norton estimates the global annual
cost of cybercrime as 113 Billion US$, with 378 Million
victims per year [1]. Although a multitude of advanced
detection (e.g., malware scanners) and mitigation (e.g.,
firewalls) techniques are available and the expenses for
defense mechanisms are significant, the problem is clearly
not under control. This is fundamentally related to the
vulnerability of Internet end-users, who fall victim to
automated attacks at vast numbers.
∗
Corresponding author. Tel.: +43 1505283030.
E-mail address: andreas.berger@alumni.tugraz.at (A. Berger).
For example, users are lured into visiting malicious ex-
ploit sites, which in turn install malware on their machines
(drive-by-downloads). This enables criminals not only to
steal sensitive data directly from infected machines, and to
extort money from the victims, e.g., by threatening them
with blocking access to their data [2]. Even worse, re-
motely controlled, malware-infected machines (i.e., bots)
serve as all-purpose platforms (i.e., botnets), and are, e.g.,
used for Distributed Denial of Service (DDoS) attacks and
Spamming campaigns.
In this paper we aim at detecting malicious websites
by monitoring DNS traffic in access networks. We exploit
the fact that these sites are required to be stealthy and
reliably available at the same time. For example, exploit
sites need to be well-reachable by the targeted users, to
http://dx.doi.org/10.1016/j.comnet.2016.02.009
1389-1286/© 2016 Elsevier B.V. All rights reserved.