Detecting APT Malware Infections Based on Malicious DNS and Traffic Analysis

被引:105
|
作者
Zhao, Guodong [1 ]
Xu, Ke [1 ,2 ]
Xu, Lei [1 ]
Wu, Bo [1 ]
机构
[1] Tsinghua Univ, Beijing 100084, Peoples R China
[2] Tsinghua Natl Lab Informat Sci & Technol, Beijing 100084, Peoples R China
来源
IEEE ACCESS | 2015年 / 3卷
关键词
APT; malware infections; DNS; intrusion detection;
D O I
10.1109/ACCESS.2015.2458581
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced persistent threat (APT) is a serious threat to the Internet. With the aid of APT malware, attackers can remotely control infected machines and steal sensitive information. DNS is popular for malware to locate command and control (C&C) servers. In this paper, we propose a novel system placed at the network egress point that aims to efficiently and effectively detect APT malware infections based on malicious DNS and traffic analysis. The system uses malicious DNS analysis techniques to detect suspicious APT malware C&C domains, and then analyzes the traffic of the corresponding suspicious IP using the signature-based and anomaly based detection technology. We extracted 14 features based on big data to characterize different properties of malware-related DNS and the ways that they are queried, and we also defined network traffic features that can identify the traffic of compromised clients that have remotely been controlled. We built a reputation engine to compute a reputation score for an IP address using these features vector together. Our experiment was performed at a large local institute network for two months, and all the features were studied with big data, which includes similar to 400 million DNS queries. Our security approach cannot only substantially reduce the volume of network traffic that needs to be recorded and analyzed but also improve the sustainability of the system.
引用
收藏
页码:1132 / 1142
页数:11
相关论文
共 50 条
  • [41] Correlation based malicious traffic analysis system
    Arivudainambi, D.
    Kumar, K. A. Varun
    Satapathy, Suresh Chandra
    [J]. INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2021, 25 (02) : 195 - 200
  • [42] MORTON: Detection of Malicious Routines in Large-Scale DNS Traffic
    Daihes, Yael
    Tzaban, Hen
    Nadler, Asaf
    Shabtai, Asaf
    [J]. COMPUTER SECURITY - ESORICS 2021, PT I, 2021, 12972 : 736 - 756
  • [43] Detecting Algorithmically Generated Domain-Flux Attacks With DNS Traffic Analysis
    Yadav, Sandeep
    Reddy, Ashwath Kumar Krishna
    Reddy, A. L. Narasimha
    Ranjan, Supranamaya
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (05) : 1663 - 1677
  • [44] Analysis of the Similarities in Malicious DNS Domain Names
    Lasota, Krzysztof
    Kozakiewicz, Adam
    [J]. SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 187 : 1 - 6
  • [45] CLEAN : an Approach for Detecting Benign Domain Names based on Passive DNS Traffic
    Han, Chunyu
    Zhang, Yongzheng
    [J]. PROCEEDINGS OF 2017 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2017), 2017, : 343 - 346
  • [46] Encrypt DNS Traffic: Automated Feature Learning Method for Detecting DNS Tunnels
    Ding, Shuai
    Zhang, Daoqing
    Ge, Jingguo
    Yuan, Xiaowei
    Du, Xinhui
    [J]. 19TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2021), 2021, : 352 - 359
  • [47] A communication-channel-based method for detecting deeply camouflaged malicious traffic
    Fang, Yong
    Li, Kai
    Zheng, Rongfeng
    Liao, Shan
    Wang, Yue
    [J]. COMPUTER NETWORKS, 2021, 197
  • [48] Using knowledge graphs and contrastive learning for detecting APT Malware on Endpoint systems
    Do Xuan, Cho
    Nguyen, Hoa Dinh
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 45 (03) : 4517 - 4533
  • [49] Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis
    Perdisci, Roberto
    Corona, Igino
    Giacinto, Giorgio
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (05) : 714 - 726
  • [50] Unveiling malicious DNS behavior profiling and generating benchmark dataset through application layer traffic analysis
    Shafi, Mohammadmoein
    Lashkari, Arash Habibi
    Mohanty, Hardhik
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2024, 118