Detection of Malicious Domains in APT via Mining Massive DNS Logs

Lu Huang*, Jingfeng Xue, Weijie Han, Zixiao Kong, Zequn Niu

*此作品的通讯作者

科研成果: 书/报告/会议事项章节会议稿件同行评审

2 引用 (Scopus)

摘要

With the rise of network attack, advanced persistent threats (APT) imposes severe challenges to network security. Since APT attacker can easily hide inevitable C&C traffic in massive Web traffic, HTTP-based C&C communication has become the most preferred method, providing us with new ideas for detecting. Moreover, under the assumption that attackers have limited attack resources, the domains used in the same attack will show relevance. Although there has been a lot of works focused on APT detection, it is still a difficult task to detect the abnormal DNS activity from massive Web traffic. In this paper, we propose a new framework based belief propagation to identify suspicious domains and compromised hosts in APT. We extract the domains features and calculate the score of being malicious from the DNS logs with minimal ground truth. We implement and validate our framework on anonymous DNS logs released by LANL. The experiment shows that our approach identifies previously unknown malicious domains and achieves high detection rates.

源语言英语
主期刊名Machine Learning for Cyber Security - Third International Conference, ML4CS 2020, Proceedings
编辑Xiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang
出版商Springer Science and Business Media Deutschland GmbH
140-152
页数13
ISBN(印刷版)9783030622220
DOI
出版状态已出版 - 2020
活动3rd International Conference on Machine Learning for Cyber Security, ML4CS 2020 - Guangzhou, 中国
期限: 8 10月 202010 10月 2020

出版系列

姓名Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
12486 LNCS
ISSN(印刷版)0302-9743
ISSN(电子版)1611-3349

会议

会议3rd International Conference on Machine Learning for Cyber Security, ML4CS 2020
国家/地区中国
Guangzhou
时期8/10/2010/10/20

指纹

探究 'Detection of Malicious Domains in APT via Mining Massive DNS Logs' 的科研主题。它们共同构成独一无二的指纹。

引用此