DCC-Find: DNS Covert Channel Detection by Features Concatenation-Based LSTM

被引:0
|
作者
Han, Dongxu [1 ,2 ]
Dong, Pu [1 ]
Li, Ning [1 ]
Cui, Xiang [3 ]
Diao, Jiawen [4 ]
Wang, Qing [2 ]
Du, Dan [1 ]
Liu, Yuling [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Zhongguancun Lab, Beijing, Peoples R China
[4] Beijing Univ Posts & Telecommun Minis, Minist Educ, Key Lab Trustworthy Distributed Comp & Serv, Beijing, Peoples R China
关键词
DNS; covert channel detection; LSTM; features concatenation; DCC tools identification;
D O I
10.1109/TrustCom56396.2022.00050
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
DNS (Domain Name System) plays an important role in network communication and it is rarely blocked by firewalls and intrusion detection systems (IDS). It is a suitable way for attackers to build DCC (DNS Covert Channel), which is used for data exfiltration. In recent years, some DCC detection methods have been proposed based on deep learning and there is no need for manual feature extraction. However, some expert knowledge is helpful to express the DNS characteristic. In this paper, we propose a FC-LSTM (Features Concatenation-based LSTM) model to detect DCC. The statistical features are concatenated with the output features of the LSTM model. This method makes the expression of DNS domain names more abundant. The experimental results have shown that the DCC traffic can be identified from normal traffic via this model, and the recognition rate is significantly improved compared with the traditional LSTM model and CNN model. In addition, we implement multi-classification in terms of the DCC tools (some of them are used in APT32). We also add generalization DNS packets (simulating APT34 traffic using DCC for stealing and attacking) to verify the robustness of our model. The FC-LSTM model has a good detection performance as well.
引用
收藏
页码:307 / 314
页数:8
相关论文
共 50 条
  • [31] Covert timing channel detection method based on time interval and payload length analysis
    Han, Jiaxuan
    Huang, Cheng
    Shi, Fan
    Liu, Jiayong
    COMPUTERS & SECURITY, 2020, 97
  • [32] Complex Motion Detection Based on Channel State Information and LSTM-RNN
    Zhang, Pengyu
    Su, Zhuoran
    Dong, Zehua
    Pahlavan, Kaveh
    2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 756 - 760
  • [33] Pedestrian Detection Algorithm Based on Integral Channel Features
    Gong, Lei
    Hong, Wei
    Wang, Jitong
    PROCEEDINGS OF THE 30TH CHINESE CONTROL AND DECISION CONFERENCE (2018 CCDC), 2018, : 941 - 946
  • [34] BECT Spike Detection Based on Novel EEG Sequence Features and LSTM Algorithms
    Xu, Zhendi
    Wang, Tianlei
    Cao, Jiuwen
    Bao, Zihang
    Jiang, Tiejia
    Gao, Feng
    IEEE TRANSACTIONS ON NEURAL SYSTEMS AND REHABILITATION ENGINEERING, 2021, 29 : 1734 - 1743
  • [35] Hybrid voice activity detection system based on LSTM and auditory speech features
    Korkmaz, Yunus
    Boyaci, Aytug
    BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2023, 80
  • [36] Mental fatigue assessment by an arbitrary channel EEG based on morphological features and LSTM-CNN
    Wu, Xiaolong
    Yang, Jianhong
    Shao, Yongcong
    Chen, Xuewei
    COMPUTERS IN BIOLOGY AND MEDICINE, 2023, 167
  • [37] A Network Covert Timing Channel Detection Method Based on Chaos Theory and Threshold Secret Sharing
    Xie, Jinpu
    Chen, Yonghong
    Wang, Linfan
    Wang, Zhe
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 2380 - 2384
  • [38] A novel covert channel detection method in cloud based on XSRM and improved event association algorithm
    Wang, Lina
    Liu, Weijie
    Kumar, Neeraj
    He, Debiao
    Tan, Cheng
    Gao, Debin
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3543 - 3557
  • [39] Network-Based Machine Learning Detection of Covert Channel Attacks on Cyber-Physical Systems
    Li, Hongwei
    Chasaki, Danai
    2022 IEEE 20TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2022, : 195 - 201
  • [40] Spam Detection in Reviews Using LSTM-Based Multi-Entity Temporal Features
    Xiang, Lingyun
    Guo, Guoqing
    Li, Qian
    Zhu, Chengzhang
    Chen, Jiuren
    Ma, Haoliang
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2020, 26 (06): : 1375 - 1390