Detecting APT Malware Infections Based on Malicious DNS and Traffic Analysis

被引:114
作者
Zhao, Guodong [1 ]
Xu, Ke [1 ,2 ]
Xu, Lei [1 ]
Wu, Bo [1 ]
机构
[1] Tsinghua Univ, Beijing 100084, Peoples R China
[2] Tsinghua Natl Lab Informat Sci & Technol, Beijing 100084, Peoples R China
关键词
APT; malware infections; DNS; intrusion detection;
D O I
10.1109/ACCESS.2015.2458581
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced persistent threat (APT) is a serious threat to the Internet. With the aid of APT malware, attackers can remotely control infected machines and steal sensitive information. DNS is popular for malware to locate command and control (C&C) servers. In this paper, we propose a novel system placed at the network egress point that aims to efficiently and effectively detect APT malware infections based on malicious DNS and traffic analysis. The system uses malicious DNS analysis techniques to detect suspicious APT malware C&C domains, and then analyzes the traffic of the corresponding suspicious IP using the signature-based and anomaly based detection technology. We extracted 14 features based on big data to characterize different properties of malware-related DNS and the ways that they are queried, and we also defined network traffic features that can identify the traffic of compromised clients that have remotely been controlled. We built a reputation engine to compute a reputation score for an IP address using these features vector together. Our experiment was performed at a large local institute network for two months, and all the features were studied with big data, which includes similar to 400 million DNS queries. Our security approach cannot only substantially reduce the volume of network traffic that needs to be recorded and analyzed but also improve the sustainability of the system.
引用
收藏
页码:1132 / 1142
页数:11
相关论文
共 25 条
[1]  
[Anonymous], 2015, TARG CYB
[2]  
Antonakakis M, 2010, P 19 USENIX SEC S WA, P273
[3]  
Antonakakis Manos, 2011, Em USENIX security symposium, V11, P1
[4]  
Bilge Leyla, 2011, P NETW DISTR SYST SE
[5]  
Brownlee N, 2001, GLOB TELECOMM CONF, P1672, DOI 10.1109/GLOCOM.2001.965864
[6]   A Day at the Root of the Internet [J].
Castro, Sebastian ;
Wessels, Duane ;
Fomenkov, Marina ;
Claffy, Kimberly .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2008, 38 (05) :41-46
[7]   Botnet detection by monitoring group activities in DNS traffic [J].
Choi, Hyunsang ;
Lee, Hanwoo ;
Lee, Heejo ;
Kim, Hyogon .
2007 CIT: 7TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, :715-720
[8]  
Freiling FC, 2005, LECT NOTES COMPUT SC, V3679, P319
[9]   An Empirical Reexamination of Global DNS Behavior [J].
Gao, Hongyu ;
Yegneswaran, Vinod ;
Chen, Yan ;
Porras, Phillip ;
Ghosh, Shalini ;
Jiang, Jian ;
Duan, Haixin .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2013, 43 (04) :267-278
[10]   Anomaly-based network intrusion detection: Techniques, systems and challenges [J].
Garcia-Teodoro, P. ;
Diaz-Verdejo, J. ;
Macia-Fernandez, G. ;
Vazquez, E. .
COMPUTERS & SECURITY, 2009, 28 (1-2) :18-28