首页> 外文会议>IEEE/ACM Symposium on Edge Computing >Defending Internet of Things Against Malicious Domain Names using D-FENS
【24h】

Defending Internet of Things Against Malicious Domain Names using D-FENS

机译:使用D-Fens捍卫恶意域名的东西互联网

获取原文

摘要

Malicious domain names have long been pervasive in the global DNS (Domain Name System) infrastructure and lend themselves to undesirable activities such as phishing or even DNS-based attacks like distributed denial-of-service (DDoS) and DNS rebinding. With the rise and explosive growth of the Internet of Things (IoT), adversaries are exploiting these devices which typically lack security measures to launch DNS-based attacks through malicious domain names. Typical countermeasures against such malicious domain names employ blacklists and whitelists to determine which domain names should be resolved. While these domain lists offer fast lookup times, they require carefully curated and up-to-date information which tends to fall short of detecting newly-registered malicious domain names. In this work, we present a system called D-FENS (DNS Filtering & Extraction Network System) which works in tandem with blacklists and features a live DNS server and binary classifier to accurately predict unreported malicious domain names. The D-FENS classifier model operates at the character-level and leverages the use of deep learning architectures such as Convolutional Neural Networks (CNN) and Long Short-Term Memory networks (LSTM) for real-time classification which forgoes the need for feature-engineering typically associated with traditional machine learning approaches. Sourcing from free and open datasets, we evaluate our system and achieve a 0.95 area under the receiver operating characteristic curve for binary classification. By accurately predicting unreported malicious domain names in real-time, D-FENS prevents Internet-connected systems from unknowingly connecting to potentially malicious domain names.
机译:恶意域名长期以来一直在全局DNS(域名系统)基础架构中普遍存在,并为不良活动提供了不良活动,如网络钓鱼甚至基于DNS的攻击,如分布式拒绝服务(DDOS)和DNS Rebinding。随着事物互联网的增长和爆炸性的增长(IOT),对手正在利用这些设备,这些设备通常缺乏安全措施来通过恶意域名启动基于DNS的攻击。对此类恶意域名的典型对策雇用黑名单和白名单来确定应解决哪些域名。虽然这些域名列表提供快速查找时间,但它们需要仔细策划和最新信息,往往会缺少检测新注册的恶意域名。在这项工作中,我们展示了一个名为D-Fens(DNS过滤和提取网络系统)的系统,它与黑名单一起工作,并具有Live DNS服务器和二进制分类器,以准确地预测未报告的恶意域名。 D-Fens分类器模型在字符级运行,利用诸如卷积神经网络(CNN)和长短期内存网络(LSTM)的深度学习架构的使用,以进行实时分类,该实时分类是对特征的需求 - 工程通常与传统机器学习方法相关联。从自由和开放数据集采购,我们评估我们的系统并在接收器操作特性曲线下实现0.95区域进行二进制分类。通过实时准确预测未报告的恶意域名,D-Fens可防止Internet连接的系统在不知不觉中连接到可能的恶意域名。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号