基于DNS查询监控出站流量过滤和应用程序识别的用户终端异常检测

Yong Jin, M. Tomoishi, N. Yamai
{"title":"基于DNS查询监控出站流量过滤和应用程序识别的用户终端异常检测","authors":"Yong Jin, M. Tomoishi, N. Yamai","doi":"10.1145/3478472.3478481","DOIUrl":null,"url":null,"abstract":"Malware attacks have become one of the most critical issues in the Internet nowadays. Most types of malware, after infecting a computer, attempt contacts to the Command and Control (C&C) servers using IP addresses or Fully Qualified Domain Name (FQDN) for further instructions. In the former case, the malware connects to the C&C servers directly without DNS name resolutions, while in the later case, DNS name resolutions for obtaining the IP addresses of the C&C servers are required. In both cases, the outbound traffic will be initialized by an unrecognized application program, the malware. In this research, we focus on these peculiarities and propose an anomaly detection system on user terminals based on outbound traffic filtering by using Software Defined Network (SDN) and DNS Response Policy Zone (DNS RPZ) technologies. In the proposed system, the outbound traffic initialized by unrecognized application programs or destined to the IP addresses obtained without DNS name resolutions will be detected and blocked on user terminals. What's more, in order to reduce false positive detections, an alert message will make the users decide whether or not to allow the detected traffic. We implemented a prototype system on MacOS machine and conducted feature evaluations. According to the evaluation results, we confirmed that the proposed system worked exactly as we designed with the features of detection, blocking and alerting anomalies on user terminals.","PeriodicalId":344692,"journal":{"name":"Proceedings of the 2021 International Conference on Human-Machine Interaction","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Anomaly Detection on User Terminals Based on Outbound Traffic Filtering by DNS Query Monitoring and Application Program Identification\",\"authors\":\"Yong Jin, M. Tomoishi, N. Yamai\",\"doi\":\"10.1145/3478472.3478481\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Malware attacks have become one of the most critical issues in the Internet nowadays. Most types of malware, after infecting a computer, attempt contacts to the Command and Control (C&C) servers using IP addresses or Fully Qualified Domain Name (FQDN) for further instructions. In the former case, the malware connects to the C&C servers directly without DNS name resolutions, while in the later case, DNS name resolutions for obtaining the IP addresses of the C&C servers are required. In both cases, the outbound traffic will be initialized by an unrecognized application program, the malware. In this research, we focus on these peculiarities and propose an anomaly detection system on user terminals based on outbound traffic filtering by using Software Defined Network (SDN) and DNS Response Policy Zone (DNS RPZ) technologies. In the proposed system, the outbound traffic initialized by unrecognized application programs or destined to the IP addresses obtained without DNS name resolutions will be detected and blocked on user terminals. What's more, in order to reduce false positive detections, an alert message will make the users decide whether or not to allow the detected traffic. We implemented a prototype system on MacOS machine and conducted feature evaluations. According to the evaluation results, we confirmed that the proposed system worked exactly as we designed with the features of detection, blocking and alerting anomalies on user terminals.\",\"PeriodicalId\":344692,\"journal\":{\"name\":\"Proceedings of the 2021 International Conference on Human-Machine Interaction\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-05-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2021 International Conference on Human-Machine Interaction\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3478472.3478481\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2021 International Conference on Human-Machine Interaction","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3478472.3478481","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

恶意软件攻击已成为当今互联网最关键的问题之一。大多数类型的恶意软件在感染计算机后,会尝试使用IP地址或完全限定域名(FQDN)联系命令与控制(C&C)服务器以获取进一步指示。前一种情况下,恶意软件直接连接到C&C服务器,不需要进行DNS名称解析;后一种情况下,需要通过DNS名称解析获取C&C服务器的IP地址。在这两种情况下,出站流量都将由无法识别的应用程序(恶意软件)初始化。本文针对这些特点,采用软件定义网络(SDN)和DNS响应策略区域(DNS RPZ)技术,提出了一种基于出站流量过滤的用户终端异常检测系统。在该系统中,用户终端将检测到未被识别的应用程序初始化的出站流量,或者到达未进行DNS名称解析的IP地址的出站流量。此外,为了减少误报检测,警报消息将让用户决定是否允许检测到的流量。我们在MacOS机上实现了一个原型系统,并进行了功能评估。根据评估结果,我们确认所提出的系统完全符合我们的设计,具有检测、阻止和报警用户终端异常的特点。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Anomaly Detection on User Terminals Based on Outbound Traffic Filtering by DNS Query Monitoring and Application Program Identification
Malware attacks have become one of the most critical issues in the Internet nowadays. Most types of malware, after infecting a computer, attempt contacts to the Command and Control (C&C) servers using IP addresses or Fully Qualified Domain Name (FQDN) for further instructions. In the former case, the malware connects to the C&C servers directly without DNS name resolutions, while in the later case, DNS name resolutions for obtaining the IP addresses of the C&C servers are required. In both cases, the outbound traffic will be initialized by an unrecognized application program, the malware. In this research, we focus on these peculiarities and propose an anomaly detection system on user terminals based on outbound traffic filtering by using Software Defined Network (SDN) and DNS Response Policy Zone (DNS RPZ) technologies. In the proposed system, the outbound traffic initialized by unrecognized application programs or destined to the IP addresses obtained without DNS name resolutions will be detected and blocked on user terminals. What's more, in order to reduce false positive detections, an alert message will make the users decide whether or not to allow the detected traffic. We implemented a prototype system on MacOS machine and conducted feature evaluations. According to the evaluation results, we confirmed that the proposed system worked exactly as we designed with the features of detection, blocking and alerting anomalies on user terminals.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Video Abnormal Behavior Detection Based on Optical Flow Method and Convolutional Neural Network Anomaly Detection on User Terminals Based on Outbound Traffic Filtering by DNS Query Monitoring and Application Program Identification A Model for Developing Emotional Computer Game Experiences Based on Physiological Measurements Tangible vs. Multi-Touch: Comparing Potential to Enhance Learning for Preschool Children Using Eye-tracking Application of Intelligent Transportation System Based on 5G
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1