首页> 外文期刊>Computers & Security >Encrypted and covert DNS queries for botnets: Challenges and countermeasures
【24h】

Encrypted and covert DNS queries for botnets: Challenges and countermeasures

机译:僵尸网络的加密和秘密DNS查询:挑战和对策

获取原文
获取原文并翻译 | 示例
           

摘要

There is a continuous increase in the sophistication that modern malware exercise in order to bypass the deployed security mechanisms. A typical approach to evade the identification and potential take down of a botnet command and control server is domain fluxing through the use of Domain Generation Algorithms (DGAs). These algorithms produce a vast amount of domain names that the infected device tries to communicate with to find the C&C server, yet only a small fragment of them is actually registered. This allows the botmaster to pivot the control and make the work of seizing the botnet control rather difficult.Current state of the art and practice considers that the DNS queries performed by a compromised device are transparent to the network administrator and therefore can be monitored, analysed, and blocked. In this work, we showcase that the latter is a strong assumption as malware could efficiently hide its DNS queries using covert and/or encrypted channels bypassing the detection mechanisms. To this end, we discuss possible mitigation measures based on traffic analysis to address the new challenges that arise from this approach. (C) 2019 Elsevier Ltd. All rights reserved.
机译:为了绕过已部署的安全机制,现代恶意软件不断地提高其复杂性。逃避僵尸网络命令和控制服务器的识别和潜在破坏的一种典型方法是通过使用域生成算法(DGA)来进行域变化。这些算法产生大量域名,被感染的设备尝试与之通信以查找C&C服务器,但实际上只有一小部分被注册。这使僵尸管理员可以控制控件,使抓取僵尸网络控件的工作变得相当困难。现有技术和实践认为,受感染设备执行的DNS查询对网络管理员而言是透明的,因此可以对其进行监视,分析。 ,并被屏蔽。在这项工作中,我们展示了后者是一个强有力的假设,因为恶意软件可以使用隐蔽和/或加密通道绕过检测机制来有效隐藏其DNS查询。为此,我们讨论了基于流量分析的可能缓解措施,以应对这种方法带来的新挑战。 (C)2019 Elsevier Ltd.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号