Practical Attacks Against DNS Reputation Systems

被引:5
作者
Galloway, Tillson [1 ]
Karakolios, Kleanthis [1 ]
Ma, Zane [2 ]
Perdisci, Roberto [1 ,3 ]
Keromytis, Angelos [1 ]
Antonakakis, Manos [1 ]
机构
[1] Georgia Inst Technol, Atlanta, GA 30332 USA
[2] Oregon State Univ, Corvallis, OR 97331 USA
[3] Univ Georgia, Athens, GA 30602 USA
来源
45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024 | 2024年
关键词
D O I
10.1109/SP54263.2024.00266
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
DNS reputation systems are a critical layer of network defense that use ML to identify potentially malicious domains based on DNS-related behaviors. Despite their importance in protecting against spam, malware, and social engineering, little is known about the adversarial robustness of real-world DNS reputation systems. This work takes a first look at general attacks against DNS reputation systems. To overcome the black-box setting of deployed DNS reputation systems, we begin by creating an open-source reference DNS reputation system that 1) overcomes common pitfalls in data collection, preprocessing, training, and evaluation found in prior work, 2) approximates DNS reputation systems from prior research, and 3) enables future reproducible research. We find that general adversarial ML techniques are impractical due to a highly constrained input space, complex feature interdependencies, and difficult inversion from feature vectors to raw input samples. We then implement two classes of practical attacks, mimicry and popularity manipulation, that achieve high success rates against both our reference model and a popular commercial DNS reputation system, highlighting the transferability of the attacks to the real world. Finally, we develop constraint models that assess the time and financial cost required to execute our attacks. Using these models, we demonstrate that an adversary with US$10 can evade a leading security vendor with a 100% success rate in two weeks.
引用
收藏
页码:4516 / 4534
页数:19
相关论文
共 89 条
[1]  
Abuse.ch, ABOUT US
[2]  
Abuse.ch, SINKDB
[3]  
[Anonymous], 2014, EUR S RES COMP SEC
[4]  
[Anonymous], 2016, IEEE S SEC PRIV S P
[5]  
[Anonymous], ChatGPT
[6]  
[Anonymous], 2009, ANN COMP SEC APPL C
[7]  
[Anonymous], 2013, P 8 ACM SIGSAC S INF
[8]  
Antonakakis Manos., 2011, P 20 USENIX C SECURI, P27
[9]  
Antonakakis Manos., 2012, USENIX security symposium, P491
[10]  
Antonakakis Manos., 2010, P 19 USENIX C SECURI, P18