首页 | 官方网站   微博 | 高级检索  
     

一种基于被动DNS数据分析的DNS重绑定攻击检测技术
引用本文:郭烜臻,潘祖烈,沈毅,陈远超.一种基于被动DNS数据分析的DNS重绑定攻击检测技术[J].信息网络安全,2021(3):87-95.
作者姓名:郭烜臻  潘祖烈  沈毅  陈远超
作者单位:国防科技大学电子对抗学院;网络空间安全态势感知与评估安徽省重点实验室
基金项目:国家重点研发计划[2017YFB0802900]。
摘    要:基于域名系统(DNS)的DNS重绑定攻击能够有效绕过同源策略、防火墙,窃取敏感信息,控制内网设备,危害巨大。DNS重绑定需要通过设置恶意域名才能实现。针对DNS重绑定相关恶意域名的检测问题,文章提出一种基于被动DNS数据分析的DNS重绑定攻击检测模型(DNS Rebinding Classifier,DRC)。通过引入被动DNS数据,从域名名称、时间、异常通信及恶意行为等4个测度集刻画DNS重绑定相关域名;基于C4.5决策树、KNN、SVM及朴素贝叶斯等分类方法对数据进行混合分类、组合训练及加权求值。交叉验证实验表明,DRC模型对相关恶意域名的识别能够达到95%以上的精确率;与恶意域名检测工具FluxBuster进行对比,DRC模型能够更准确地识别相关恶意域名。

关 键 词:DNS重绑定  被动DNS  恶意域名检测  混合分类

DNS Rebinding Detection Technology Based on Passive DNS Data Analysis
GUO Xuanzhen,PAN Zulie,SHEN Yi,CHEN Yuanchao.DNS Rebinding Detection Technology Based on Passive DNS Data Analysis[J].Netinfo Security,2021(3):87-95.
Authors:GUO Xuanzhen  PAN Zulie  SHEN Yi  CHEN Yuanchao
Affiliation:(College of Electronic Engineering,National University of Defense Technology,Hefei 230037,China;Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation,Hefei 230037,China)
Abstract:DNS rebinding attack based on the domain name system (DNS) can effectivelybypass the homologous strategy and firewall, steal sensitive information, and control intranetdevices, causing great harm to the Internet community. DNS rebinding can only be realized bysetting malicious domain name. Aiming at the detection of malicious domain names related toDNS rebinding, this paper proposes a DNS rebinding classifier (DRC) based on passive DNSdata analysis. By introducing passive DNS data, the domain names related to DNS rebinding are characterized from the four measure sets of domain name, time, abnormal communicationand malicious behavior. Based on C4.5 decision tree, KNN, SVM and naive Bayes classificationmethods, the data are classified, trained and weighted. Cross validation experiments show that theaccuracy of DRC model for identifying related malicious domain names can reach more than 95%.Compared with the malicious domain name detection tool FluxBuster, DRC model can identifyrelated malicious domain names more accurately.
Keywords:DNS rebinding  passive DNS  malware domain name detection  mixed classification
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号