Information Technology Journal1812-56381812-5646Asian Network for Scientific Information10.3923/itj.2012.1048.1055YuXiangzhan ZhangBo KangLe ChenJuan 82012118Botnet is one of the most active threats on the Internet today. Fast-flux technique is a popular way employed by botnet to evade detection. In this paper, we used data mining techniques to detect the fast-flux botnets. By analyzing the patterns of the Domain Name System (DNS) queries from the fast-flux botnets, we extract six features for constructing the weighted Support Vector Machine (SVM) in order to distinguish the normal network domain access from the fast-flux botnet domain access. The evaluation suggested that the approach is effective in detecting the fast-flux botnets.]]>Arce, I. and E. Levy,200318287Sandeep, S. and T. Andreas,20072007Zhuge J.W., X.H. Han, Y.L. Zhou, Z.Y. Ye and W. Zou,20083702715Zhen, L., T. Liang and Z. Ming-Tian,20087165169Yan, R. and Q. Zheng,2009811801188Al-Momani, A.A.D., T.C. Wan, K. Al-Saedi and A. Altaher,20111133013307Takemori, K., D. Romaa, S. Kubota, K. Sugitani and Y. Musashi,20092009pp: 246249Romana, D.A.L., S. Kubota, K. Sugitani and Y. Musashi,20082008pp:205208Choi, H., H. Lee, H. Lee and H. Kim,20072007pp: 715720Choi, H., H. Lee and H. Kim,20092009Wang, X., L. Yang, X. Sun, J. Han, W. Liang and L. Huang,2010911651171Modarresi, A., A. Mamat, H. Ibrahim and N. Mustapha,2008838953902Chen, H., H. Xu, C. Wang and K. Zhou,20111022422251Nazario, J. and T. Holz,20082008pp: 2431Holz, T., C. Gorecki, K. Rieck and F. Freiling,20082008pp: 112Passerini, E., R. Paleari, L. Martignoni and D. Bruschi,20082008pp: 186206Wang, Y.,20092009Abuse.ch,20122012GeoIP,20112011Nello, C. and S.T. John,2004pp: 47-68pp: 47-68Liejun, W., L. Huicheng and Z. Taiyi,20087370373Yao, Y., L. Feng, B. Jin and F. Chen,201211200208Shahrabi, J., S.S. Mousavi and M. Heydar,20099521527