College of Computer Science and Technology, Jilin University, Changchun 130012, China.
Key Laboratory of Symbol Computation and Knowledge Engineering (Jilin University), Ministry of Education, Changchun 130012, China.
Sensors (Basel). 2020 Jan 28;20(3):731. doi: 10.3390/s20030731.
As sensors become more prevalent in our lives, security issues have become a major concern. In the Advanced Persistent Threat (APT) attack, the sensor has also become an important role as a transmission medium. As a relatively weak link in the network transmission process, sensor networks often become the target of attackers. Due to the characteristics of low traffic, long attack time, diverse attack methods, and real-time evolution, existing detection methods have not been able to detect them comprehensively. Current research suggests that a suspicious domain name can be obtained by analyzing the domain name resolution (DNS) request to the target network in an APT attack. In past work based on DNS log analyses, most of the work would simply calculate the characteristics of the request message or the characteristics of the response message or the feature set of the request message plus the response message, and the relationship between the response message and the request message was not considered. This may leave out the detection of some APT attacks in which the DNS resolution process is incomplete. This paper proposes a new feature that represents the relationship between a DNS request and the response message, based on a deep learning method used to analyze the DNS request records. The algorithm performs threat assessment on the DNS behavior to be detected based on the calculated suspicious value. This paper uses the data of 4, 907, 147, 146 DNS request records (376, 605, 606 records after DNS Data Pre-processing) collected in a large campus network and uses simulation attack data to verify the validity and correctness of the system. The results of the experiments show that our method achieves an average accuracy of 97.6% in detecting suspicious DNS behavior, with the orange false positive (FP) at 2.3% and the recall at 96.8%. The proposed system can effectively detect the hidden and suspicious DNS behavior in APT.
随着传感器在我们生活中的普及,安全问题已成为一个主要关注点。在高级持续性威胁 (APT) 攻击中,传感器也成为了传输媒介的重要角色。作为网络传输过程中相对较弱的一环,传感器网络经常成为攻击者的目标。由于流量低、攻击时间长、攻击方式多样且实时演变等特点,现有的检测方法无法全面检测到它们。目前的研究表明,可以通过分析 APT 攻击中对目标网络的域名解析 (DNS) 请求来获取可疑域名。在过去基于 DNS 日志分析的工作中,大多数工作只是简单地计算请求消息的特征、响应消息的特征或请求消息加响应消息的特征集,而没有考虑响应消息与请求消息之间的关系。这可能会遗漏一些 DNS 解析过程不完整的 APT 攻击的检测。本文提出了一种新的特征,该特征基于用于分析 DNS 请求记录的深度学习方法,表示 DNS 请求与响应消息之间的关系。该算法根据计算出的可疑值对要检测的 DNS 行为进行威胁评估。本文使用在一个大型校园网络中收集的 4907147146 个 DNS 请求记录(DNS 数据预处理后为 376605606 条记录)的数据,并使用模拟攻击数据来验证系统的有效性和正确性。实验结果表明,我们的方法在检测可疑 DNS 行为方面平均准确率达到 97.6%,橙色误报 (FP) 为 2.3%,召回率为 96.8%。所提出的系统可以有效地检测 APT 中的隐藏和可疑 DNS 行为。