A topology based flow model for computing domain reputation

Igor Mishsky, Nurit Gal-Oz, Ehud Gudes

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

12 Scopus citations

Abstract

The Domain Name System (DNS) is an essential component of the internet infrastructure that translates domain names into IP addresses. Recent incidents verify the enormous damage of malicious activities utilizing DNS such as bots that use DNS to locate their command & control servers. Detecting malicious domains using the DNS network is therefore a key challenge. We project the famous expression Tell me who your friends are and I will tell you who you are, motivating many social trust models, on the internet domains world. A domain that is related to malicious domains is more likely to be malicious as well. In this paper, our goal is to assign reputation values to domains and IPs indicating the extent to which we consider them malicious. We start with a list of domains known to be malicious or benign and assign them reputation scores accordingly. We then construct a DNS based graph in which nodes represent domains and IPs. Our new approach for computing domain reputation applies a flow algorithm on the DNS graph to obtain the reputation of domains and identify potentially malicious ones. The experimental evaluation of the flow algorithm demonstrates its success in predicting malicious domains.

Original languageEnglish
Title of host publicationData and Applications Security and Privacy XXIX - 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Proceedings
EditorsPierangela Samarati
PublisherSpringer Verlag
Pages277-292
Number of pages16
ISBN (Print)9783319208091
DOIs
StatePublished - 1 Jan 2015
Event29th IFIP WG 11.3 Working Conference on Data and Applications Security, DBSec 2015 - Fairfax, United States
Duration: 13 Jul 201515 Jul 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9149
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference29th IFIP WG 11.3 Working Conference on Data and Applications Security, DBSec 2015
Country/TerritoryUnited States
CityFairfax
Period13/07/1515/07/15

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'A topology based flow model for computing domain reputation'. Together they form a unique fingerprint.

Cite this