An Adaptive Malicious Domain Detection Mechanism with DNS Traffic

被引:1
|
作者
ShuoXu [1 ]
Li, ShuQin [1 ]
Meng, Kun [1 ]
Wu, LiJun [1 ]
Ding, Meng [1 ]
机构
[1] Beijing Informat Sci Technol Univ, Joint Lab Sensing & Computat Intelligence, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Botnet; Domain Generation Algorithm; Markov Chain; Self-adaption;
D O I
10.1145/3171592.3171595
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A domain in Internet represents an address where some services may be provided, and the domain providing malicious service, such as Botnet communication and nonexistent service etc., is called malicious. Once the security system cannot detect and block a family of malicious domain, they will soon flood the whole Internet with request and threaten the network security. Hence, the efficiency and accuracy are always used to evaluate malicious detection models. In this paper, a universal grammar structure detection model with the Markov chain is discussed, which has the benefit of flexibly extracting all kinds of grammar features. Moreover, this paper propose a hybrid malicious domain detection model with techniques of grammar structures and traffic temporal features. The detection backbone is a grammar structure based model which ensure the efficiency, meanwhile traffic temporal feature are timely extracted and used to train the backbone model. Given collected test sample sets and one-month campus network real-time traffic, the proposed model is verified through comparing with enterprise C&C detection tools. The experiment result show that the efficiency, accuracy and scalability all achieve much progress.
引用
收藏
页码:86 / 91
页数:6
相关论文
共 50 条
  • [1] DNS Traffic Analysis for Malicious Domains Detection
    Ghafir, Ibrahim
    Prenosil, Vaclav
    [J]. 2ND INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN) 2015, 2015, : 613 - 618
  • [2] DNS Graph Mining For Malicious Domain Detection
    Hau Tran
    An Nguyen
    Phuong Vo
    Tu Vu
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 4680 - 4685
  • [3] Malicious DNS Tunneling Detection in Real-Traffic DNS Data
    Lambion, Danielle
    Josten, Michael
    Olumofin, Femi
    De Cock, Martine
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 5736 - 5738
  • [4] MORTON: Detection of Malicious Routines in Large-Scale DNS Traffic
    Daihes, Yael
    Tzaban, Hen
    Nadler, Asaf
    Shabtai, Asaf
    [J]. COMPUTER SECURITY - ESORICS 2021, PT I, 2021, 12972 : 736 - 756
  • [5] Malicious Domain Detection Based on Traffic Similarity
    Hu, Jianping
    Wang, Yongyi
    Shi, Fan
    Xu, Chengxi
    [J]. 2ND INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY, CII 2017, 2017, : 416 - 421
  • [6] DNS Covert Channel Detection Based on Self-Generated Malicious Traffic
    Diao, Jia-Wen
    Fang, Bin-Xing
    Tian, Zhi-Hong
    Wang, Zhong-Ru
    Song, Shou-You
    Wang, Tian
    Cui, Xiang
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2022, 45 (10): : 2190 - 2206
  • [7] An Imbalanced Malicious Domains Detection Method Based on Passive DNS Traffic Analysis
    Liu, Zhenyan
    Zeng, Yifei
    Zhang, Pengfei
    Xue, Jingfeng
    Zhang, Ji
    Liu, Jiangtao
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [8] Malicious DNS Traffic in Tor: Analysis and Countermeasures
    Sonntag, Michael
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 536 - 543
  • [9] DNS dataset for malicious domains detection
    Marques, Claudio
    Malta, Silvestre
    Magalhaes, Joao Paulo
    [J]. DATA IN BRIEF, 2021, 38
  • [10] Analysis of the Similarities in Malicious DNS Domain Names
    Lasota, Krzysztof
    Kozakiewicz, Adam
    [J]. SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 187 : 1 - 6