Detecting Malicious Activity with DNS Backscatter

K. Fukuda, J. Heidemann
{"title":"Detecting Malicious Activity with DNS Backscatter","authors":"K. Fukuda, J. Heidemann","doi":"10.1145/2815675.2815706","DOIUrl":null,"url":null,"abstract":"Network-wide activity is when one computer (the originator) touches many others (the targets). Motives for activity may be benign (mailing lists, CDNs, and research scanning), malicious (spammers and scanners for security vulnerabilities), or perhaps indeterminate (ad trackers). Knowledge of malicious activity may help anticipate attacks, and understanding benign activity may set a baseline or characterize growth. This paper identifies DNS backscatter as a new source of information about network-wide activity. Backscatter is the reverse DNS queries caused when targets or middleboxes automatically look up the domain name of the originator. Queries are visible to the authoritative DNS servers that handle reverse DNS. While the fraction of backscatter they see depends on the server's location in the DNS hierarchy, we show that activity that touches many targets appear even in sampled observations. We use information about the queriers to classify originator activity using machine-learning. Our algorithm has reasonable precision (70-80%) as shown by data from three different organizations operating DNS servers at the root or country-level. Using this technique we examine nine months of activity from one authority to identify trends in scanning, identifying bursts corresponding to Heartbleed and broad and continuous scanning of ssh.","PeriodicalId":340581,"journal":{"name":"Proceedings of the 2015 Internet Measurement Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"20","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2015 Internet Measurement Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2815675.2815706","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 20

Abstract

Network-wide activity is when one computer (the originator) touches many others (the targets). Motives for activity may be benign (mailing lists, CDNs, and research scanning), malicious (spammers and scanners for security vulnerabilities), or perhaps indeterminate (ad trackers). Knowledge of malicious activity may help anticipate attacks, and understanding benign activity may set a baseline or characterize growth. This paper identifies DNS backscatter as a new source of information about network-wide activity. Backscatter is the reverse DNS queries caused when targets or middleboxes automatically look up the domain name of the originator. Queries are visible to the authoritative DNS servers that handle reverse DNS. While the fraction of backscatter they see depends on the server's location in the DNS hierarchy, we show that activity that touches many targets appear even in sampled observations. We use information about the queriers to classify originator activity using machine-learning. Our algorithm has reasonable precision (70-80%) as shown by data from three different organizations operating DNS servers at the root or country-level. Using this technique we examine nine months of activity from one authority to identify trends in scanning, identifying bursts corresponding to Heartbleed and broad and continuous scanning of ssh.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
检测恶意活动与DNS反向散射
网络范围内的活动是指一台计算机(发起者)接触许多其他计算机(目标)。活动的动机可能是良性的(邮件列表、cdn和研究扫描),也可能是恶意的(垃圾邮件发送者和安全漏洞扫描器),或者可能是不确定的(广告跟踪器)。了解恶意活动可以帮助预测攻击,而了解良性活动可以设置基线或描述增长。本文将DNS反向散射作为一种新的网络活动信息来源。反向散射是当目标或中间机器自动查找发起者的域名时引起的反向DNS查询。查询对于处理反向DNS的权威DNS服务器是可见的。虽然他们看到的反向散射的比例取决于服务器在DNS层次结构中的位置,但我们表明,即使在抽样观察中也会出现接触许多目标的活动。我们使用关于查询者的信息来使用机器学习对发起者的活动进行分类。我们的算法具有合理的精度(70-80%),如三个不同组织在根或国家级别操作DNS服务器的数据所示。使用这种技术,我们检查了来自一个权威机构的9个月的活动,以确定扫描趋势,识别与“心脏出血”相对应的爆发,以及对ssh的广泛和连续扫描。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Session details: Search and Ads Management Plane Analytics Session details: Analyses Quantifying Interference between Measurements on the RIPE Atlas Platform Session details: What's in a Name?
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1