Scalable analytics to detect DNS misuse for establishing stealthy communication channels

被引:6
|
作者
Schales, D. L. [1 ]
Jang, J. [1 ]
Wang, T. [2 ]
Hu, X. [1 ]
Kirat, D. [1 ]
Wuest, B. [2 ]
Stoecklin, M. Ph. [1 ]
机构
[1] IBM Corp, Div Res, Thomas J Watson Res Ctr, Yorktown Hts, NY 10598 USA
[2] IBM Secur Div, CTO Secur Intelligence, Fredericton, NB E3C 1B2, Canada
关键词
D O I
10.1147/JRD.2016.2557639
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Domain Name System (DNS) protocol is one of the few application protocols that are allowed to cross network perimeters of organizations. However, comprehensive monitoring of DNS traffic has been often overlooked in many organizations' cybersecurity strategies. As such, DNS provides a highly attractive channel for advanced threat actors and botnet operators to establish hard-to-block and stealthy communication channels between infected devices and command-and-control (C&C) infrastructures. Fast-fluxing (FF) and domain name generation algorithms (DGAs) are two well-known public DNS exploitation techniques to build agile C&C infrastructures. The detection of FF and DGA domain names is a big data problem, as it requires analyzing millions of DNS queries and replies over extended time periods. In this paper, we propose two algorithms to perform DNS analytics and effectively detect FF and DGA domain names. More importantly, we describe how the algorithms are implemented using two big data processing models: MapReduce and Feature Collection and Correlation Engine. The algorithms and implementation proposed are iterative and scale over long analysis periods. We describe the implementations and provide an evaluation complemented with case studies on 50 days of real-world DNS data consisting of more than 40 billion events, collected within a large corporate network.
引用
收藏
页数:14
相关论文
共 19 条
  • [1] DRAMD: Detect Advanced DRAM-based Stealthy Communication Channels with Neural Networks
    Lv, Zhiyuan
    Zhao, Youjian
    Zhang, Chao
    Li, Haibin
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2020, : 1907 - 1916
  • [2] Quantitatively Analyzing Stealthy Communication Channels
    Butler, Patrick
    Xu, Kui
    Yao, Danfeng Daphne
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2011), 2011, 6715 : 238 - 254
  • [3] Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference
    Nabeel, Mohamed
    Khalil, Issa M.
    Guan, Bei
    Yu, Ting
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2020, 23 (04)
  • [4] The Use of Beacon Signals to Detect Covert Channels in DNS Traffic
    Eremeev, M. A.
    Nefedov, V. S.
    Ostrovskii, A. S.
    Semchenkov, D. A.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2021, 55 (08) : 962 - 969
  • [5] The Use of Beacon Signals to Detect Covert Channels in DNS Traffic
    M. A. Eremeev
    V. S. Nefedov
    A. S. Ostrovskii
    D. A. Semchenkov
    Automatic Control and Computer Sciences, 2021, 55 : 962 - 969
  • [6] Establishing Optimal Wave Communication Channels Automatically
    Miller, David A. B.
    JOURNAL OF LIGHTWAVE TECHNOLOGY, 2013, 31 (24) : 3987 - 3994
  • [7] Establishing Communication Channels for Digital Storytelling Applications
    Oyarzun, David
    del Puy Carretero, Maria
    Mujika, Andoni
    Arrieta, Aitor
    INTERACTIVE STORYTELLING, 2010, 6432 : 260 - 263
  • [8] Stealthy Messaging: Leveraging Message Queuing Telemetry Transport for Covert Communication Channels
    Lazzaro, Sara
    Buccafurri, Francesco
    APPLIED SCIENCES-BASEL, 2024, 14 (19):
  • [9] A PROTOCOL FOR ESTABLISHING SECURE COMMUNICATION CHANNELS IN A LARGE NETWORK
    HARN, L
    HUANG, D
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 1994, 6 (01) : 188 - 191
  • [10] A scalable wavelet video coder for hybrid communication channels
    Yoon, SH
    Rao, SS
    THIRTY-FIRST ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, VOLS 1 AND 2, 1998, : 382 - 386