Publication: Analyzing the dynamics behavior of fast-flux dmain name system through visualization
dc.contributor.affiliation | #PLACEHOLDER_PARENT_METADATA_VALUE# | en_US |
dc.contributor.author | Andi Fitriah Binti Abdul Kadir | en_US |
dc.date.accessioned | 2024-10-08T07:42:01Z | |
dc.date.available | 2024-10-08T07:42:01Z | |
dc.date.issued | 2013 | |
dc.description.abstract | As attempts to thwart cyber crime have intensified, so have innovations in how cybercriminals’ provision their infrastructure to dodge detection and take-down. Today, a growing, sophisticated technique called Fast-Flux Service Networks (FFSN) poses a major problem to Internet security. They are increasingly used in many illegal practices including money mule recruitment sites, distribution of malware downloads, illegal adult content and other forms of Internet fraud. Essentially, FFSN were first used as a Domain Name Server (DNS) switching mechanism that combine distributed command and control, web-based load-balancing, and proxy redirection. However, cybercriminals are making use of this technology to cover their tracks and avoid detection. As such, their criminal infrastructures stay up longer to get more victims. These issues are tackled by investigating the dynamics of FFSN by using k-Nearest Neighbor (kNN) classification method and data visualization technique. This combination can assist network administrators and security analyst to recognize the threats more easily and efficiently. In this study, over 500 domains are collected and monitored. By applying kNN classifier to the trained data, the presence of Single-Flux (SF), NS-Flux (NSF), and Double-Flux (DF) are observed. Subsequently, by scrutinizing and visualizing these fluxing domain names, the new types of fluxing designated as NS-Name-Flux(NF) and Nested-NS-Flux (NNF) are discovered. The analysis results of both NF and NNF exposed that FFSN have become extensively sophisticated and dynamic. This exemplifies that visualization is an alternative and effective data exploration method for understanding the complex behaviors of FFSN. | en_US |
dc.description.callnumber | t TK 5105.59 A552A 2013 | en_US |
dc.description.degreelevel | Master | en_US |
dc.description.identifier | Thesis : Analyzing the dynamics behavior of fast-flux dmain name system through visualization /by Andi Fitriah Binti Abdul Kadir | en_US |
dc.description.identity | t00011282824AndiFitriah | en_US |
dc.description.kulliyah | Kulliyyah of Information and Communication Technology | en_US |
dc.description.notes | Thesis (MCS)--International Islamic University Malaysia, 2013 | en_US |
dc.description.physicaldescription | xxii, 176 leaves :ill. ;30cm. | en_US |
dc.description.programme | Master in Computer Science | en_US |
dc.identifier.uri | https://studentrepo.iium.edu.my/handle/123456789/9569 | |
dc.identifier.url | https://lib.iium.edu.my/mom/services/mom/document/getFile/wXfxQbGeKSWPF4VayTMCXAW4Cg42hdC620151020111246065 | |
dc.language.iso | en | en_US |
dc.publisher | Kuala Lumpur : International Islamic University Malaysia, 2013 | en_US |
dc.rights | Copyright International Islamic University Malaysia | |
dc.subject.lcsh | Internet--Security measures | en_US |
dc.subject.lcsh | Computer networks--Security measures | en_US |
dc.subject.lcsh | Information technology--Security measures | en_US |
dc.title | Analyzing the dynamics behavior of fast-flux dmain name system through visualization | en_US |
dc.type | Master Thesis | en_US |
dspace.entity.type | Publication |