DCC-Find: DNS Covert Channel Detection by Features Concatenation-Based LSTM

被引:0
|
作者
Han, Dongxu [1 ,2 ]
Dong, Pu [1 ]
Li, Ning [1 ]
Cui, Xiang [3 ]
Diao, Jiawen [4 ]
Wang, Qing [2 ]
Du, Dan [1 ]
Liu, Yuling [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Zhongguancun Lab, Beijing, Peoples R China
[4] Beijing Univ Posts & Telecommun Minis, Minist Educ, Key Lab Trustworthy Distributed Comp & Serv, Beijing, Peoples R China
关键词
DNS; covert channel detection; LSTM; features concatenation; DCC tools identification;
D O I
10.1109/TrustCom56396.2022.00050
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
DNS (Domain Name System) plays an important role in network communication and it is rarely blocked by firewalls and intrusion detection systems (IDS). It is a suitable way for attackers to build DCC (DNS Covert Channel), which is used for data exfiltration. In recent years, some DCC detection methods have been proposed based on deep learning and there is no need for manual feature extraction. However, some expert knowledge is helpful to express the DNS characteristic. In this paper, we propose a FC-LSTM (Features Concatenation-based LSTM) model to detect DCC. The statistical features are concatenated with the output features of the LSTM model. This method makes the expression of DNS domain names more abundant. The experimental results have shown that the DCC traffic can be identified from normal traffic via this model, and the recognition rate is significantly improved compared with the traditional LSTM model and CNN model. In addition, we implement multi-classification in terms of the DCC tools (some of them are used in APT32). We also add generalization DNS packets (simulating APT34 traffic using DCC for stealing and attacking) to verify the robustness of our model. The FC-LSTM model has a good detection performance as well.
引用
收藏
页码:307 / 314
页数:8
相关论文
共 50 条
  • [21] A LSTM-Based Channel Fingerprinting Method for Intrusion Detection
    Ma, Ting
    Hu, Feng
    Ma, Maode
    2021 IEEE 5TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP), 2021, : 113 - 116
  • [22] Network Storage Covert Channel Detection Based on Data Joint Analysis
    Fu, Guangxin
    Li, Qingbao
    Chen, Zhifeng
    Zeng, Guangyu
    Gu, Juanjuan
    CLOUD COMPUTING AND SECURITY, PT IV, 2018, 11066 : 346 - 357
  • [23] Mimic: An active covert channel that evades regularity-based detection
    Kothari, Kush
    Wright, Matthew
    COMPUTER NETWORKS, 2013, 57 (03) : 647 - 657
  • [24] covert channel detection based on scale-free networks theory
    Lan, Li
    Xia Linglin
    Wei Wenhong
    SECOND INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN, VOL 1, PROCEEDINGS, 2009, : 378 - 380
  • [25] Unsupervised detection method of RoQ covert attacks based on multilayer features
    Zhao J.
    Li J.
    Long C.
    Wan W.
    Wei J.
    Chen
    Tongxin Xuebao/Journal on Communications, 2022, 43 (09): : 224 - 239
  • [26] A Detection-Resistant Covert Timing Channel Based on Geometric Huffman Coding
    Liu, Jianhua
    Yang, Wei
    Huang, Liusheng
    Chen, Wuji
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2018), 2018, 10874 : 308 - 320
  • [27] Liquid: A detection-resistant covert timing channel based on IPD shaping
    Walls, Robert J.
    Kothari, Kush
    Wright, Matthew
    COMPUTER NETWORKS, 2011, 55 (06) : 1217 - 1228
  • [28] A network covert timing channel detection method based on threshold secret sharing
    Xie, Jinpu
    Chen, Yonghong
    Wang, Linfan
    Wang, Zhe
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (02)
  • [29] Study on the detection algorithm of covert network behavior channel based on corrected entropy
    Qian, Y.-W. (admon1999@163.com), 2013, Chinese Institute of Electronics (35):
  • [30] Brain Tumor Detection Based on Deep Features Concatenation and Machine Learning Classifiers With Genetic Selection
    Wageh, Mohamed
    Amin, Khalid
    Algarni, Abeer D.
    Hamad, Ahmed M.
    Ibrahim, Mina
    IEEE ACCESS, 2024, 12 : 114923 - 114939