首页> 外文会议>Irish Signals and Systems Conference >Getting Prepared for the Next Botnet Attack : Detecting Algorithmically Generated Domains in Botnet Command and Control
【24h】

Getting Prepared for the Next Botnet Attack : Detecting Algorithmically Generated Domains in Botnet Command and Control

机译:为下一次僵尸网络攻击做准备:在僵尸网络命令和控制中检测算法生成的域

获取原文

摘要

This paper highlights the high noise to signal ratio that DNS traffic poses to network defense' incident detection and response, and the broader topic of the critical time component required from intrusion detection for actionable security intelligence. Nowhere is this truer than in the monitoring and interception of malware command and control communications hidden amongst benign DNS internet traffic. Global ransomware and malware families were responsible for over 5 billion USD in losses. In 4 days Reaper, a Mirai variant, infected 2.7m nodes. The scale of malware infections outstrips information security blacklisting ability to keep pace. Machine learning techniques, such as CLIP, provide the ability to detect malware traffic to malicious command and control domains with high reliability using lexical properties and semantic patterns in algorithmically generated domain names.
机译:本文重点介绍了DNS流量对网络防御的事件检测和响应造成的高信噪比,以及入侵检测对可操作的安全智能所需的关键时间组件的更广泛主题。在监控和拦截隐藏在良性DNS互联网流量中的恶意软件命令和控制通信中,没有比这更真实的了。全球勒索软件和恶意软件家族造成的损失超过50亿美元。在4天之内,Mirai变种“收割者”感染了270万个节点。恶意软件感染的规模超过了信息安全黑名单保持同步的能力。诸如CLIP之类的机器学习技术提供了使用算法生成的域名中的词汇属性和语义模式,以高可靠性检测到恶意命令和控制域的恶意软件流量的功能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号