Randall et al., 2022 - Google Patents
The Challenges of Blockchain-Based Naming Systems for Malware DefendersRandall et al., 2022
View PDF- Document ID
- 8517443071741374355
- Author
- Randall A
- Hardaker W
- Voelker G
- Savage S
- Schulman A
- Publication year
- Publication venue
- 2022 APWG Symposium on Electronic Crime Research (eCrime)
External Links
Snippet
Successful malware campaigns often rely on the ability of infected hosts to locate and contact their command-and-control (C2) servers. Malware campaigns often use DNS domains for this purpose, but DNS domains may be taken down by the registrar that sold …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from or digital output to record carriers, e.g. RAID, emulated record carriers, networked record carriers
- G06F3/0601—Dedicated interfaces to storage systems
- G06F3/0602—Dedicated interfaces to storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L29/00—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
- H04L29/12—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents characterised by the data terminal contains provisionally no documents
- H04L29/12009—Arrangements for addressing and naming in data networks
- H04L29/12047—Directories; name-to-address mapping
- H04L29/12056—Directories; name-to-address mapping involving standard directories and standard directory access protocols
- H04L29/12066—Directories; name-to-address mapping involving standard directories and standard directory access protocols using Domain Name System [DNS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from or digital output to record carriers, e.g. RAID, emulated record carriers, networked record carriers
- G06F3/0601—Dedicated interfaces to storage systems
- G06F3/0628—Dedicated interfaces to storage systems making use of a particular technique
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements or network protocols for addressing or naming
- H04L61/15—Directories; Name-to-address mapping
- H04L61/1505—Directories; Name-to-address mapping involving standard directories or standard directory access protocols
- H04L61/1511—Directories; Name-to-address mapping involving standard directories or standard directory access protocols using domain name system [DNS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/1097—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for distributed storage of data in a network, e.g. network file system [NFS], transport mechanisms for storage area networks [SAN] or network attached storage [NAS]
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10740363B2 (en) | Domain classification based on domain name system (DNS) traffic | |
Zhauniarovich et al. | A survey on malicious domains detection through DNS data analysis | |
Kührer et al. | Going wild: Large-scale classification of open DNS resolvers | |
Khormali et al. | Domain name system security and privacy: A contemporary survey | |
Maroofi et al. | COMAR: classification of compromised versus maliciously registered domains | |
Nappa et al. | CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers. | |
US20130007870A1 (en) | Systems for bi-directional network traffic malware detection and removal | |
US20130007882A1 (en) | Methods of detecting and removing bidirectional network traffic malware | |
EP2033108A2 (en) | Method and apparatus for controlling access to network resources based on reputation | |
Giani et al. | Data exfiltration and covert channels | |
Schmid | Thirty years of DNS insecurity: Current issues and perspectives | |
Borgaonkar | An analysis of the asprox botnet | |
Kaur et al. | Botnet and botnet detection techniques in cyber realm | |
Crocker et al. | Security and other technical concerns raised by the DNS filtering requirements in the PROTECT IP Bill | |
Rajendran | DNS amplification & DNS tunneling attacks simulation, detection and mitigation approaches | |
Chiba et al. | DomainProfiler: toward accurate and early discovery of domain names abused in future | |
Ren et al. | An analysis of first-party cookie exfiltration due to cname redirections | |
So et al. | Domains do change their spots: Quantifying potential abuse of residual trust | |
Randall et al. | The Challenges of Blockchain-Based Naming Systems for Malware Defenders | |
Pihelgas | Back-tracing and Anonymity in Cyberspace | |
De et al. | Goal based threat modeling for peer-to-peer cloud | |
Sinha et al. | CookieArmor: Safeguarding against cross‐site request forgery and session hijacking | |
Rawat et al. | ZeroAccess botnet investigation and analysis | |
Chahal et al. | TempR: application of stricture dependent intelligent classifier for fast flux domain detection | |
Marchal | DNS and semantic analysis for phishing detection |