Fast-fluxing is generally classified into two types: single fluxing and double fluxing, a build-on implementation over single fluxing. The phraseologies involved in fast-fluxing includes "flux-herder mothership nodes" and "fast-flux agent nodes", referred to the backend
bulletproof botnet controller and the compromised
host nodes involved in reverse proxying the traffic back-and-forth between the
origin and clients respectively. The compromised hosts used by the fast-flux herders typically includes
residential broadband access circuits, such as
DSL and
cable modems.
Single-flux network In single-flux network, the
authoritative name server of a fast-fluxing domain name repeatedly
permutes the
DNS resource records with low
time to live (TTL) values, conventionally between 180 and 600 seconds. The permuted record within the
zone file includes
A, AAAA and
CNAME record, the disposition is usually done by means of
round robin from a registry of exploited host's IP addresses and
DDNS names. Although
HTTP and
DNS remain commonly proxied
application protocols by the frontend flux-agents, protocols such as
SMTP,
IMAP and
POP can also be delivered through
transport layer (L4)
TCP and
UDP level
port binding techniques between flux-agents and backend flux-herder nodes.
Double-flux network Double-fluxing networks involve high-frequency permutation of the fluxing domain's authoritative name servers, along with DNS resource records such as A, AAAA, or CNAME pointing to frontend proxies. In this infrastructure, the authoritative name server of the fluxing domain points to a frontend redirector node, which forwards the
DNS datagram to a backend mothership node that resolves the query. The DNS resource records, including the NS record, are set with a lower TTL value, therefore resulting in an additional
level indirection. The NS records in a double-fluxing network usually point to a referrer host that listens on
port 53, which forwards the query to a backend DNS resolver that is authoritative for the fluxing domain. Advanced level of resilience and redundancy is achieved through
blind proxy redirection techniques of the frontend nodes; Fast-fluxing domains also abuse
domain wildcarding specification for spam delivery and phishing, and use
DNS covert channels for transferring application layer payloads of protocols such as HTTP,
SFTP, and FTP encapsulated within a DNS datagram query.
Domain-flux network Domain-flux network involves keeping a fast-fluxing network operational through continuously rotating the domain name of the flux-herder mothership nodes. The domain names are dynamically generated using a selected
pseudorandom domain generation algorithm (DGA), and the flux operator mass-registers the domain names. An infected host repeatedly tries to initiate a
flux-agent handshake by spontaneous generating, resolving and connecting to an IP address until an
acknowledgment, to register itself to the flux-herder mothership node. A notable example includes
Conficker, a botnet which was operational by generating 50,000 different domains in 110
top-level domains (TLDs). ==Security countermeasures==