首页> 外文会议>2019 7th International Symposium on Digital Forensics and Security >Thwarting C2 Communication of DGA-Based Malware using Process-level DNS Traffic Tracking
【24h】

Thwarting C2 Communication of DGA-Based Malware using Process-level DNS Traffic Tracking

机译:使用进程级DNS流量跟踪阻止基于DGA的恶意软件的C2通信

获取原文
获取原文并翻译 | 示例

摘要

Many modern botnet malwares use Domain Generation Algorithms (DGAs) to dynamically generate the domain names that resolve to their command and control (C2) centers. This approach allows these malwares to subvert traditional detection systems which rely on blacklists of known domains associated with malicious activities to block malware communications. Since the advent of DGA-based malwares, the efforts to prevent the said malwares from contacting their command and control centers (C2) server have been centered around detecting Algorithmically Generated Domain Names through lexicographic analysis, isolating entire infected devices or both. Recent research has emerged, which more accurately identifies infected devices in a network, by monitoring the volumes of domain resolution failures. While effective, these techniques are slow to identify DGA generated domain names. Even after the delayed identification, the only preliminary mitigation known today is a complete shutdown of a device that is suspected to be infected. In this paper, we present a new method to counter DGA-based malwares by limiting the impact of mitigation. Instead of isolating the entire infected device from the network we limit network activity of the malicious process alone. Our objective is to prevent DGA-based malwares from communicating with their C2 centers while allowing an infected device to maintain its normal functionality. We achieve this by tracking Domain Name Service (DNS) responses of individual processes and blacklisting those processes for which DNS traffic have abnormally large numbers of domain resolution failures. The blacklisting at a process level ensures that non-malicious processes in the infected device can continue functioning.
机译:许多现代的僵尸网络恶意软件使用域生成算法(DGA)动态生成可解析为其命令和控制(C2)中心的域名。这种方法允许这些恶意软件颠覆传统的检测系统,该系统依靠与恶意活动相关联的已知域黑名单来阻止恶意软件通信。自基于DGA的恶意软件问世以来,防止上述恶意软件与命令和控制中心(C2)服务器联系的工作一直围绕着通过字典分析检测算法生成的域名,隔离整个受感染的设备或同时检测这两种设备。最近出现的研究通过监视域解析失败的数量来更准确地识别网络中的受感染设备。虽然有效,但是这些技术在识别DGA生成的域名方面很慢。即使在延迟识别之后,今天已知的唯一初步缓解措施是完全关闭怀疑被感染的设备。在本文中,我们提出了一种通过限制缓解影响来对抗基于DGA的恶意软件的新方法。与其将整个受感染的设备与网络隔离开来,我们仅限制恶意进程的网络活动。我们的目标是防止基于DGA的恶意软件与其C2中心进行通信,同时允许受感染的设备保持其正常功能。我们通过跟踪单个进程的域名服务(DNS)响应,并将那些DNS流量异常大量的域解析失败的进程列入黑名单,来实现此目的。进程级别的黑名单可确保受感染设备中的非恶意进程可以继续运行。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号