Finding malicious usage via Capture, Storage, Analysis and Visualization of DNS packets

dc.contributor.authorChowdhury, Chandan
dc.date.accessioned2019-04-09T15:02:32Z
dc.date.available2019-04-09T15:02:32Z
dc.date.graduationmonthMayen_US
dc.date.issued2019-05-01
dc.date.published2019en_US
dc.description.abstractThe first step of accessing any resource over the internet is to find the IP address of the hosting server corresponding to the easy to remember domain name. For this purpose, the Domain Name System (DNS) was introduced in 1985. We can think of DNS as the phone-book directory of the internet. DNS is fundamental to the proper functioning of the modern internet and without DNS it will be very difficult, if not impossible, to navigate the modern internet. However, like any tool, it is being used for both benign and malicious purposes. Malicious programs use algorithmically generated domains to rendezvous with their command and control server to receive tasks to be performed. DNS has also been used as a covert channel for data exfiltration. Analysis of DNS logs can reveal suspicious domains queried by infected hosts and thus can help prevent and reduce security incidents in a network. Due to high volume and distributed nature, capturing, logging and analyzing DNS data is non-trivial. In this thesis, we provide a framework for capturing, logging, aggregating and analyzing DNS data and show the results by applying our methods to a university-wide DNS server. We were able to find hosts which were making Web Proxy Auto Discovery(WPAD) queries which is used by hosts to automatically find and use web proxy servers available in a network but also makes those hosts vulnerable to Man-in-the-Middle(MITM)attack by rogue hosts connected to the same network. The framework also helped us quickly detect and find all hosts in our network which were infected by backdoor put in CCleaner, very popular utility software for maintaining Microsoft Windows systems. Investigation of suspicious domains reveals hosts that we believe are running Potentially Unwanted Programs (PUP).en_US
dc.description.advisorEugene Vassermanen_US
dc.description.degreeMaster of Scienceen_US
dc.description.departmentDepartment of Computer Scienceen_US
dc.description.levelMastersen_US
dc.identifier.urihttp://hdl.handle.net/2097/39482
dc.language.isoen_USen_US
dc.subjectDomain Name Systemen_US
dc.subjectNetwork Securityen_US
dc.subjectNetwork Log Analysisen_US
dc.titleFinding malicious usage via Capture, Storage, Analysis and Visualization of DNS packetsen_US
dc.typeThesisen_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
ChandanChowdhury2019.pdf
Size:
31.47 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.62 KB
Format:
Item-specific license agreed upon to submission
Description: