Detection of Malicious Domains in APT via Mining Massive DNS Logs

Lu Huang*, Jingfeng Xue, Weijie Han, Zixiao Kong, Zequn Niu

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

With the rise of network attack, advanced persistent threats (APT) imposes severe challenges to network security. Since APT attacker can easily hide inevitable C&C traffic in massive Web traffic, HTTP-based C&C communication has become the most preferred method, providing us with new ideas for detecting. Moreover, under the assumption that attackers have limited attack resources, the domains used in the same attack will show relevance. Although there has been a lot of works focused on APT detection, it is still a difficult task to detect the abnormal DNS activity from massive Web traffic. In this paper, we propose a new framework based belief propagation to identify suspicious domains and compromised hosts in APT. We extract the domains features and calculate the score of being malicious from the DNS logs with minimal ground truth. We implement and validate our framework on anonymous DNS logs released by LANL. The experiment shows that our approach identifies previously unknown malicious domains and achieves high detection rates.

Original languageEnglish
Title of host publicationMachine Learning for Cyber Security - Third International Conference, ML4CS 2020, Proceedings
EditorsXiaofeng Chen, Hongyang Yan, Qiben Yan, Xiangliang Zhang
PublisherSpringer Science and Business Media Deutschland GmbH
Pages140-152
Number of pages13
ISBN (Print)9783030622220
DOIs
Publication statusPublished - 2020
Event3rd International Conference on Machine Learning for Cyber Security, ML4CS 2020 - Guangzhou, China
Duration: 8 Oct 202010 Oct 2020

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume12486 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference3rd International Conference on Machine Learning for Cyber Security, ML4CS 2020
Country/TerritoryChina
CityGuangzhou
Period8/10/2010/10/20

Keywords

  • APT
  • C&C detection
  • DNS
  • Malicious domain detection

Fingerprint

Dive into the research topics of 'Detection of Malicious Domains in APT via Mining Massive DNS Logs'. Together they form a unique fingerprint.

Cite this