首页> 外文会议>International conference on information and communications security >LagProber: Detecting DGA-Based Malware by Using Query Time Lag of Non-existent Domains
【24h】

LagProber: Detecting DGA-Based Malware by Using Query Time Lag of Non-existent Domains

机译:LagProber:通过使用不存在域的查询时间延迟来检测基于DGA的恶意软件

获取原文

摘要

Domain Generation Algorithm (DGA) has been outfitted by various malware families to extend the resistance to the blacklist-based techniques. A lot of previous approaches have been developed to detect the DGA-based malware based on the lexical property of the random generated domains. Unfortunately, attackers can adjust their DGAs to produce domains by simulating the character distribution of popular domains or words and thus can evade the detection of these approaches. In this work, we develop an approach from a novel perspective, i.e., the query time lags of non-existent domains (NXDomain), to mitigate DGA-based malware without the lexical property. The key insight is that, unlike the benign hosts, the hosts infected by the same malware families will query a lot of NXDomains in inherent time lags. We design a system, LagProber, to detect infected hosts by analyzing the distribution of time lags. Our experiment with a week of real world DNS traffic reveals that LagProber is able to detect the infected hosts with low false positive rate.
机译:各种恶意软件家族都配备了域生成算法(DGA),以扩展对基于黑名单的技术的抵抗力。已经开发了许多先前的方法,用于基于随机生成的域的词法属性来检测基于DGA的恶意软件。不幸的是,攻击者可以通过模拟流行域或单词的字符分布来调整其DGA以生成域,从而逃避了对这些方法的检测。在这项工作中,我们从新颖的角度开发了一种方法,即不存在域的查询时间滞后(NXDomain),以缓解没有词法属性的基于DGA的恶意软件。关键的见解是,与良性主机不同,被相同恶意软件家族感染的主机将在固有的时滞中查询大量NXDomain。我们设计了一个系统LagProber,通过分析时间间隔的分布来检测受感染的主机。我们对真实世界DNS流量进行了一周的实验后发现,LagProber能够以较低的误报率检测到受感染的主机。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号