首页> 外文OA文献 >Detection of malicious and low throughput data exfiltration over the DNS protocol
【2h】

Detection of malicious and low throughput data exfiltration over the DNS protocol

机译:通过DNs检测恶意和低吞吐量数据泄漏  协议

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

In the presence of security countermeasures, a malware designed for dataexfiltration must do so using a covert channel to achieve its goal. Amongexisting covert channels stands the domain name system (DNS) protocol. Althoughthe detection of covert channels over the DNS has been thoroughly studied inthe last decade, previous research dealt with a specific subclass of covertchannels, namely DNS tunneling. While the importance of tunneling detection isnot undermined, an entire class of low throughput DNS exfiltration malwareremained overlooked. The goal of this study is to propose a method fordetecting both tunneling and low-throughput data exfiltration over the DNS.Towards this end, we propose a solution composed of a supervised featureselection method, and an interchangeable, and adjustable anomaly detectionmodel trained on legitimate traffic. In the first step, a one-class classifieris applied for detecting domain-specific traffic that does not conform with thenormal behavior. Then, in the second step, in order to reduce the falsepositive rate resulting from the attempt to detect the low-throughput dataexfiltration we apply a rule-based filter that filters data exchange over DNSused by legitimate services. Our solution was evaluated on a medium-scalerecursive DNS server logs, and involved more than 75,000 legitimate uses andalmost 2,000 attacks. Evaluation results shows that while DNS tunneling iscovered with at least 99% recall rate and less than 0.01% false positive rate,the detection of low throughput exfiltration is more difficult. While notpreventing it completely, our solution limits a malware attempting to avoiddetection with at most a 1kb/h of payload under the limitations of the DNSsyntax (equivalent to five credit cards details, or ten user credentials perhour) which reduces the effectiveness of the attack.
机译:在安全对策的情况下,专为dataexfiltration恶意软件必须这样做使用隐蔽信道来实现其目标。 Amongexisting隐蔽通道站的域名系统(DNS)协议。在DNS隐蔽通道Althoughthe检测已被彻底研究在矿井过去的十年中,以往的研究处理covertchannels的具体子类,即DNS隧道。虽然隧道检测IsNot运算削弱了,整个班级低吞吐量DNS渗出malwareremained的重要性被忽视。这项研究的目的是提出fordetecting提供隧道和低通量数据泄露在DNS.Towards为此的方法,我们提出了一个监督featureselection方法组成的解决方案,以及可更换,可调节异常detectionmodel训练有素的合法流量。在第一步骤中,施加用于检测不与thenormal行为符合特定于域的流量一类classifieris。然后,在第二个步骤,以减少从试图检测我们采用基于规则的过滤器滤网数据交换在由合法服务DNSused低通量dataexfiltration引起的假阳性率。在中等scalerecursive DNS服务器日志我们的解决方案进行了评估,并涉及超过75000种合法用途andalmost 2000次的攻击。评价结果表明,虽然DNS隧道具有至少99%的召回率和小于0.01%的假阳性率IsCovered该低吞吐量渗出的检测更加困难。虽然完全notpreventing它,我们的解决方案限制了恶意软件试图avoiddetection至多一个1KB /负载下的DNSsyntax的限制(相当于5点信用卡的详细信息,或十个用户凭据perhour)H从而降低了攻击的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号