MFRdnsI: A DNS Recursive Server Identification and Classification Method Based on Deep Learning

被引:4
作者
Li, Gaochao [1 ,2 ]
Chen, Xunxun [3 ]
Chang, Peng [1 ]
Zou, Xin [3 ]
Zang, Tianning [1 ]
Wu, Xiao [3 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Coordinat Ctr China, Emergency Response Tech Team, Natl Comp Network, Beijing, Peoples R China
来源
PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SYSTEMS (ICISS 2019) | 2019年
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
DNS recursive server; identification; features; deep learning;
D O I
10.1145/3322645.3322675
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet and domain name infrastructure are developing rapidly. The amount of domain name registration and system deployment scale of the domain name system continue to grow. The security and stable operation of the domain name system is a necessary for the stable running of the Internet. It is necessary to monitor the security status of important network elements such as the recursive server of the domain name system. In the work of Internet recursive server identification, the active detection method often has some problems. A lot of recursive server refuse to reply to foreign requester and some internet areas are unreachable to the probers. This paper proposes a recursive server identification method based on deep learning called MFRdnsI, which analysis the traffic direction characteristics, traffic statistics features and protocol field features in the DNS resolving records and uses multi-layer perceptron for automatic learning of multidimensional features. The experimental results show that MFRdnsI can effectively identify and classify the recursive server IP in the resolving logs and has high accuracy and low false positive rate.
引用
收藏
页码:27 / 32
页数:6
相关论文
共 15 条
[1]  
[Anonymous], 2015, P 4 ANN ACM C RES IN
[2]  
[Anonymous], NEURAL NETWORKS LEAR
[3]  
[Anonymous], 2017, P ACM C WASH DC US J
[4]  
[Anonymous], 2018, TECHNICAL REPORT
[5]   Detecting Malicious Activity with DNS Backscatter [J].
Fukuda, Kensuke ;
Heidemann, John .
IMC'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON INTERNET MEASUREMENT CONFERENCE, 2015, :197-210
[6]   Making the Case for Elliptic Curves in DNSSEC [J].
Gill, Phillipa .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2015, 45 (05) :13-19
[7]  
Gojmerac I, 2015, IEEE ICC, P7426, DOI 10.1109/ICC.2015.7249513
[8]   From .academy to .zone: An Analysis of the New TLD Land Rush [J].
Halvorson, Tristan ;
Der, Matthew F. ;
Foster, Ian ;
Savage, Stefan ;
Saul, Lawrence K. ;
Voelker, Geoffrey M. .
IMC'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON INTERNET MEASUREMENT CONFERENCE, 2015, :381-394
[9]   A Study of the Impact of DNS Resolvers on Performance Using a Causal Approach [J].
Hours, Hadrien ;
Biersack, Ernst ;
Loiseau, Patrick ;
Finamore, Alessandro ;
Mellia, Marco .
2015 27TH INTERNATIONAL TELETRAFFIC CONGRESS ITC 27, 2015, :10-18
[10]   Detection Method of DNS-based Botnet Communication using Obtained NS Record History [J].
Ichise, Hikaru ;
Jin, Yong ;
Iida, Katsuyoshi .
IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, :676-677