×

Detection of infected network devices and fast-flux networks by tracking URL and DNS resolution changes

  • US 9,270,693 B2
  • Filed: 09/19/2013
  • Issued: 02/23/2016
  • Est. Priority Date: 09/19/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for detecting Fast-Flux malware, the method comprising:

  • monitoring by a network traffic monitor a plurality of domain name system (DNS) lookup requests to one or more DNS servers initiated by one or more network devices in a local area network (LAN) to a wide area network (WAN), the DNS lookup requests comprising a plurality of requests to resolve one or more uniform resource locators (URLs) to one or more received network addresses (IP);

    monitoring the one or more received network addresses (IP) resolved for the one or more URLs to provide a URL-to-IP associations list, wherein the URL-to-IP associations list is configured to store one or more suspicious URLs;

    monitoring the one or more DNS servers used for the DNS lookup requests for resolving the URLs to provide a DNS Domain-to-DNS server associations list;

    generating a suspicious URL log based on the URL-to-IP associations list and a suspicious DNS log based on the DNS Domain-to-DNS server associations list;

    determining whether a designated suspicious URL from the suspicious URL log matches designated data in the suspicious DNS log; and

    after determining that the designated suspicious URL from the suspicious URL log matches the designated data in the suspicious DNS log, generating an event indicating a combination of flux actions are active.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×