DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour

被引:0
|
作者
Kristijan Žiža
Predrag Tadić
Pavle Vuletić
机构
[1] University of Belgrade,
[2] School of Electrical Engineering,undefined
来源
International Journal of Information Security | 2023年 / 22卷
关键词
DNS exfiltration; Adversarial attacks; Machine learning;
D O I
暂无
中图分类号
学科分类号
摘要
The Domain Name System (DNS) exfiltration is an activity in which an infected device sends data to the attacker’s server by encoding it in DNS request messages. Because of the frequent use of DNS exfiltration for malicious purposes, exfiltration detection gained attention from the research community which proposed several predominantly machine learning-based methods. The majority of previous studies used publicly available DNS exfiltration tools with the default configuration parameters, resulting in datasets created from DNS exfiltration requests that are usually significantly longer, have more DNS name labels, and higher character entropy than average regular DNS requests. This further led to overly optimistic detection rates. In this paper, we have explored some of the strategies an attacker could use to avoid exfiltration detection. First, we have explored the impact of DNS exfiltration tools’ parameter variation on the exfiltration detection accuracy. Second, we have modified the DNSExfiltrator tool to produce exfiltration requests which have significantly lower character entropy. This approach proved to be capable of deceiving classifiers based on single DNS request features. Only around 1% of modified DNS requests shorter or equal to 9 bytes, and less than one third of DNS exfiltration requests in the overall population were accurately detected. In addition, we present a methodology and an aggregated feature set (including inter-request timing statistics) which can be used for accurate DNS exfiltration in this kind of adversarial settings.
引用
收藏
页码:1865 / 1880
页数:15
相关论文
共 50 条
  • [21] Adversarial attacks on fingerprint liveness detection
    Jianwei Fei
    Zhihua Xia
    Peipeng Yu
    Fengjun Xiao
    EURASIP Journal on Image and Video Processing, 2020
  • [22] Two level verification for detection of DNS rebinding attacks
    Brahmasani, Siva
    Sivasankar, E.
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2013, 4 (02) : 138 - 145
  • [23] Robust Automatic Modulation Classification in the Presence of Adversarial Attacks
    Sahay, Rajeev
    Love, David J.
    Brinton, Christopher G.
    2021 55TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2021,
  • [24] Upcycling adversarial attacks for infrared object detection
    Kim, Hoseong
    Lee, Chanyong
    NEUROCOMPUTING, 2022, 482 : 1 - 13
  • [25] Detection of adversarial attacks on machine learning systems
    Judah, Matthew
    Sierchio, Jen
    Planer, Michael
    ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING FOR MULTI-DOMAIN OPERATIONS APPLICATIONS V, 2023, 12538
  • [26] ROBUST DETECTION OF ADVERSARIAL ATTACKS ON MEDICAL IMAGES
    Li, Xin
    Zhu, Dongxiao
    2020 IEEE 17TH INTERNATIONAL SYMPOSIUM ON BIOMEDICAL IMAGING (ISBI 2020), 2020, : 1154 - 1158
  • [27] On the robustness of skeleton detection against adversarial attacks
    Bai, Xiuxiu
    Yang, Ming
    Liu, Zhe
    NEURAL NETWORKS, 2020, 132 : 416 - 427
  • [28] On The Detection Of Adversarial Attacks Through Reliable AI
    Vaccari, Ivan
    Carlevaro, Alberto
    Narteni, Sara
    Cambiaso, Enrico
    Mongelli, Maurizio
    IEEE INFOCOM 2022 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2022,
  • [29] Detection and Defense of Topological Adversarial Attacks on Graphs
    Zhang, Yingxue
    Regol, Florence
    Pal, Soumyasundar
    Khan, Sakif
    Ma, Liheng
    Coates, Mark
    24TH INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND STATISTICS (AISTATS), 2021, 130
  • [30] Adversarial Sampling Attacks Against Phishing Detection
    Shirazi, Hossein
    Bezawada, Bruhadeshwar
    Ray, Indrakshi
    Anderson, Charles
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXIII, 2019, 11559 : 83 - 101