首页> 外文会议>IEEE International Conference on Trust, Security and Privacy in Computing and Communications >Detecting DNS Tunnel through Binary-Classification Based on Behavior Features
【24h】

Detecting DNS Tunnel through Binary-Classification Based on Behavior Features

机译:通过基于行为特征的二进制分类来检测DNS隧道

获取原文

摘要

DNS tunnel is a typical Internet covert channel used by attackers or bots to evade the malicious activities detection. The stolen information is encoded and encapsulated into the DNS packets to transfer. Since DNS traffic is common, most of the firewalls directly allow it to pass and IDS does not trigger an alarm with it. The popular signature-based detection methods and threshold-based methods are not flexible and make high false alarms. The approaches based on characters distribution features also do not perform well, because attackers can modify the encoding method to disturb the characters distributions. In this paper, we propose an effective and applicable DNS tunnel detection mechanism. The prototype system is deployed at the Recursive DNS for tunnel identification. We use four kinds of features including time-interval features, request packet size features, record type features and subdomain entropy features. We evaluate the performance of our proposal with Support Vector Machine, Decision Tree and Logistical Regression. The experiments show that the method can achieve high detection accuracy of 99.96%.
机译:DNS隧道是攻击者或机器人使用的典型互联网封面,以逃避恶意活动检测。被盗信息被编码并封装到DNS数据包中以传输。由于DNS流量很常见,大多数防火墙直接允许它传递给传递,并且ID不会触发闹钟。流行的基于签名的检测方法和基于阈值的方法不灵活,并制作高误报。基于角色分布功能的方法也不表现良好,因为攻击者可以修改编码方法以干扰字符分布。在本文中,我们提出了一种有效且适用的DNS隧道检测机制。原型系统部署在递归DNS以进行隧道识别。我们使用四种功能,包括时间间隔功能,请求数据包大小功能,记录类型特征和子域熵功能。我们评估我们的提案与支持向量机,决策树和后勤回归的表现。实验表明,该方法可以达到99.96%的高检测精度。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号