An Adaptive Malicious Domain Detection Mechanism with DNS Traffic

被引:1
作者
ShuoXu [1 ]
Li, ShuQin [1 ]
Meng, Kun [1 ]
Wu, LiJun [1 ]
Ding, Meng [1 ]
机构
[1] Beijing Informat Sci Technol Univ, Joint Lab Sensing & Computat Intelligence, Beijing, Peoples R China
来源
PROCEEDINGS OF 2017 VI INTERNATIONAL CONFERENCE ON NETWORK, COMMUNICATION AND COMPUTING (ICNCC 2017) | 2017年
基金
中国国家自然科学基金;
关键词
Botnet; Domain Generation Algorithm; Markov Chain; Self-adaption;
D O I
10.1145/3171592.3171595
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A domain in Internet represents an address where some services may be provided, and the domain providing malicious service, such as Botnet communication and nonexistent service etc., is called malicious. Once the security system cannot detect and block a family of malicious domain, they will soon flood the whole Internet with request and threaten the network security. Hence, the efficiency and accuracy are always used to evaluate malicious detection models. In this paper, a universal grammar structure detection model with the Markov chain is discussed, which has the benefit of flexibly extracting all kinds of grammar features. Moreover, this paper propose a hybrid malicious domain detection model with techniques of grammar structures and traffic temporal features. The detection backbone is a grammar structure based model which ensure the efficiency, meanwhile traffic temporal feature are timely extracted and used to train the backbone model. Given collected test sample sets and one-month campus network real-time traffic, the proposed model is verified through comparing with enterprise C&C detection tools. The experiment result show that the efficiency, accuracy and scalability all achieve much progress.
引用
收藏
页码:86 / 91
页数:6
相关论文
共 18 条
  • [1] [Anonymous], 2006, DOMAIN NAME SERVICE
  • [2] Antonakakis M, 2012, LOGIN MAGAZINE USENI, V37, P15
  • [3] Antonakakis M., 2012, PROC USENIX C SECUR, P491
  • [4] Identifying botnets by capturing group activities in DNS traffic
    Choi, Hyunsang
    Lee, Heejo
    [J]. COMPUTER NETWORKS, 2012, 56 (01) : 20 - 33
  • [5] Davuth N., 2013, INT J SECURITY ITS A, V7
  • [6] Gavrilut D T, 2017, INT S SYMB NUM ALG S
  • [7] Botnet command and control techniques
    Heron, Simon
    [J]. Network Security, 2007, 2007 (04) : 13 - 16
  • [8] Lasota K, 2011, COMM COM INF SC, V187, P1
  • [9] Schiavoni Stefano, 2013, COMPUTER SCI
  • [10] Botnets: A survey
    Silva, Sergio S. C.
    Silva, Rodrigo M. P.
    Pinto, Raquel C. G.
    Salles, Ronaldo M.
    [J]. COMPUTER NETWORKS, 2013, 57 (02) : 378 - 403