Cargando…

AULD: Large Scale Suspicious DNS Activities Detection via Unsupervised Learning in Advanced Persistent Threats

In recent years, sensors in the Internet of things have been commonly used in Human’s life. APT (Advanced Persistent Threats) has caused serious damage to network security and the sensors play an important role in the attack process. For a long time, attackers infiltrate, attack, conceal, spread, an...

Descripción completa

Detalles Bibliográficos
Autores principales: Yan, Guanghua, Li, Qiang, Guo, Dong, Li, Bing
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6679267/
https://www.ncbi.nlm.nih.gov/pubmed/31330986
http://dx.doi.org/10.3390/s19143180
_version_ 1783441299153616896
author Yan, Guanghua
Li, Qiang
Guo, Dong
Li, Bing
author_facet Yan, Guanghua
Li, Qiang
Guo, Dong
Li, Bing
author_sort Yan, Guanghua
collection PubMed
description In recent years, sensors in the Internet of things have been commonly used in Human’s life. APT (Advanced Persistent Threats) has caused serious damage to network security and the sensors play an important role in the attack process. For a long time, attackers infiltrate, attack, conceal, spread, and steal information of target groups through the compound use of various attacking means, while existing security measures based on single-time nodes cannot defend against such attacks. Attackers often exploit the sensors’ vulnerabilities to attack targets because the security level of the sensors is relatively low when compared with that of the host. We can find APT attacks by checking the suspicious domains generated at different APT attack stages, since every APT attack has to use DNS to communicate. Although this method works, two challenges still exist: (1) the detection method needs to check a large scale of log data; (2) the small number of attacking samples limits conventional supervised learning. This paper proposes an APT detection framework AULD (Advanced Persistent Threats Unsupervised Learning Detection) to detect suspicious domains in APT attacks by using unsupervised learning. We extract ten important features from the host, domain name, and time from a large number of DNS log data. Later, we get the suspicious cluster by performing unsupervised learning. We put all of the domains in the cluster into the list of malicious domains. We collected 1,584,225,274 DNS records from our university network. The experiments show that AULD detected all of the attacking samples and that AULD can effectively detect the suspicious domain names in APT attacks.
format Online
Article
Text
id pubmed-6679267
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-66792672019-08-19 AULD: Large Scale Suspicious DNS Activities Detection via Unsupervised Learning in Advanced Persistent Threats Yan, Guanghua Li, Qiang Guo, Dong Li, Bing Sensors (Basel) Article In recent years, sensors in the Internet of things have been commonly used in Human’s life. APT (Advanced Persistent Threats) has caused serious damage to network security and the sensors play an important role in the attack process. For a long time, attackers infiltrate, attack, conceal, spread, and steal information of target groups through the compound use of various attacking means, while existing security measures based on single-time nodes cannot defend against such attacks. Attackers often exploit the sensors’ vulnerabilities to attack targets because the security level of the sensors is relatively low when compared with that of the host. We can find APT attacks by checking the suspicious domains generated at different APT attack stages, since every APT attack has to use DNS to communicate. Although this method works, two challenges still exist: (1) the detection method needs to check a large scale of log data; (2) the small number of attacking samples limits conventional supervised learning. This paper proposes an APT detection framework AULD (Advanced Persistent Threats Unsupervised Learning Detection) to detect suspicious domains in APT attacks by using unsupervised learning. We extract ten important features from the host, domain name, and time from a large number of DNS log data. Later, we get the suspicious cluster by performing unsupervised learning. We put all of the domains in the cluster into the list of malicious domains. We collected 1,584,225,274 DNS records from our university network. The experiments show that AULD detected all of the attacking samples and that AULD can effectively detect the suspicious domain names in APT attacks. MDPI 2019-07-19 /pmc/articles/PMC6679267/ /pubmed/31330986 http://dx.doi.org/10.3390/s19143180 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Yan, Guanghua
Li, Qiang
Guo, Dong
Li, Bing
AULD: Large Scale Suspicious DNS Activities Detection via Unsupervised Learning in Advanced Persistent Threats
title AULD: Large Scale Suspicious DNS Activities Detection via Unsupervised Learning in Advanced Persistent Threats
title_full AULD: Large Scale Suspicious DNS Activities Detection via Unsupervised Learning in Advanced Persistent Threats
title_fullStr AULD: Large Scale Suspicious DNS Activities Detection via Unsupervised Learning in Advanced Persistent Threats
title_full_unstemmed AULD: Large Scale Suspicious DNS Activities Detection via Unsupervised Learning in Advanced Persistent Threats
title_short AULD: Large Scale Suspicious DNS Activities Detection via Unsupervised Learning in Advanced Persistent Threats
title_sort auld: large scale suspicious dns activities detection via unsupervised learning in advanced persistent threats
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6679267/
https://www.ncbi.nlm.nih.gov/pubmed/31330986
http://dx.doi.org/10.3390/s19143180
work_keys_str_mv AT yanguanghua auldlargescalesuspiciousdnsactivitiesdetectionviaunsupervisedlearninginadvancedpersistentthreats
AT liqiang auldlargescalesuspiciousdnsactivitiesdetectionviaunsupervisedlearninginadvancedpersistentthreats
AT guodong auldlargescalesuspiciousdnsactivitiesdetectionviaunsupervisedlearninginadvancedpersistentthreats
AT libing auldlargescalesuspiciousdnsactivitiesdetectionviaunsupervisedlearninginadvancedpersistentthreats