DocumentCode
19221
Title
Detecting APT Malware Infections Based on Malicious DNS and Traffic Analysis
Author
Zhao, G. ; Xu, K. ; Xu, L. ; Wu, B.
Author_Institution
Tsinghua Univ., Beijing, China
Volume
3
fYear
2015
fDate
2015
Firstpage
1132
Lastpage
1142
Abstract
Advanced persistent threat (APT) is a serious threat to the Internet. With the aid of APT malware, attackers can remotely control infected machines and steal sensitive information. DNS is popular for malware to locate command and control (C&C) servers. In this paper, we propose a novel system placed at the network egress point that aims to efficiently and effectively detect APT malware infections based on malicious DNS and traffic analysis. The system uses malicious DNS analysis techniques to detect suspicious APT malware C&C domains, and then analyzes the traffic of the corresponding suspicious IP using the signature-based and anomaly based detection technology. We extracted 14 features based on big data to characterize different properties of malware-related DNS and the ways that they are queried, and we also defined network traffic features that can identify the traffic of compromised clients that have remotely been controlled. We built a reputation engine to compute a reputation score for an IP address using these features vector together. Our experiment was performed at a large local institute network for two months, and all the features were studied with big data, which includes ~400 million DNS queries. Our security approach cannot only substantially reduce the volume of network traffic that needs to be recorded and analyzed but also improve the sustainability of the system.
Keywords
Big Data; Internet; digital signatures; invasive software; query processing; APT malware infection detection; Big Data; C&C servers; DNS query; IP address; Internet; advanced persistent threat; anomaly based detection technology; command and control server; feature vector; large local institute network; malicious DNS analysis techniques; network egress point; network traffic features; security approach; signature-based based detection technology; traffic analysis; Command and control systems; Feature extraction; IP networks; Intrusion detection; Malware; Web servers; APT; DNS; intrusion detection; malware infections;
fLanguage
English
Journal_Title
Access, IEEE
Publisher
ieee
ISSN
2169-3536
Type
jour
DOI
10.1109/ACCESS.2015.2458581
Filename
7163279
Link To Document