Cargando…

Discovering Suspicious APT Behaviors by Analyzing DNS Activities

As sensors become more prevalent in our lives, security issues have become a major concern. In the Advanced Persistent Threat (APT) attack, the sensor has also become an important role as a transmission medium. As a relatively weak link in the network transmission process, sensor networks often beco...

Descripción completa

Detalles Bibliográficos
Autores principales: Yan, Guanghua, Li, Qiang, Guo, Dong, Meng, Xiangyu
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7038486/
https://www.ncbi.nlm.nih.gov/pubmed/32013016
http://dx.doi.org/10.3390/s20030731
_version_ 1783500651598184448
author Yan, Guanghua
Li, Qiang
Guo, Dong
Meng, Xiangyu
author_facet Yan, Guanghua
Li, Qiang
Guo, Dong
Meng, Xiangyu
author_sort Yan, Guanghua
collection PubMed
description As sensors become more prevalent in our lives, security issues have become a major concern. In the Advanced Persistent Threat (APT) attack, the sensor has also become an important role as a transmission medium. As a relatively weak link in the network transmission process, sensor networks often become the target of attackers. Due to the characteristics of low traffic, long attack time, diverse attack methods, and real-time evolution, existing detection methods have not been able to detect them comprehensively. Current research suggests that a suspicious domain name can be obtained by analyzing the domain name resolution (DNS) request to the target network in an APT attack. In past work based on DNS log analyses, most of the work would simply calculate the characteristics of the request message or the characteristics of the response message or the feature set of the request message plus the response message, and the relationship between the response message and the request message was not considered. This may leave out the detection of some APT attacks in which the DNS resolution process is incomplete. This paper proposes a new feature that represents the relationship between a DNS request and the response message, based on a deep learning method used to analyze the DNS request records. The algorithm performs threat assessment on the DNS behavior to be detected based on the calculated suspicious value. This paper uses the data of 4, 907, 147, 146 DNS request records (376, 605, 606 records after DNS Data Pre-processing) collected in a large campus network and uses simulation attack data to verify the validity and correctness of the system. The results of the experiments show that our method achieves an average accuracy of 97.6% in detecting suspicious DNS behavior, with the orange false positive (FP) at 2.3% and the recall at 96.8%. The proposed system can effectively detect the hidden and suspicious DNS behavior in APT.
format Online
Article
Text
id pubmed-7038486
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-70384862020-03-09 Discovering Suspicious APT Behaviors by Analyzing DNS Activities Yan, Guanghua Li, Qiang Guo, Dong Meng, Xiangyu Sensors (Basel) Article As sensors become more prevalent in our lives, security issues have become a major concern. In the Advanced Persistent Threat (APT) attack, the sensor has also become an important role as a transmission medium. As a relatively weak link in the network transmission process, sensor networks often become the target of attackers. Due to the characteristics of low traffic, long attack time, diverse attack methods, and real-time evolution, existing detection methods have not been able to detect them comprehensively. Current research suggests that a suspicious domain name can be obtained by analyzing the domain name resolution (DNS) request to the target network in an APT attack. In past work based on DNS log analyses, most of the work would simply calculate the characteristics of the request message or the characteristics of the response message or the feature set of the request message plus the response message, and the relationship between the response message and the request message was not considered. This may leave out the detection of some APT attacks in which the DNS resolution process is incomplete. This paper proposes a new feature that represents the relationship between a DNS request and the response message, based on a deep learning method used to analyze the DNS request records. The algorithm performs threat assessment on the DNS behavior to be detected based on the calculated suspicious value. This paper uses the data of 4, 907, 147, 146 DNS request records (376, 605, 606 records after DNS Data Pre-processing) collected in a large campus network and uses simulation attack data to verify the validity and correctness of the system. The results of the experiments show that our method achieves an average accuracy of 97.6% in detecting suspicious DNS behavior, with the orange false positive (FP) at 2.3% and the recall at 96.8%. The proposed system can effectively detect the hidden and suspicious DNS behavior in APT. MDPI 2020-01-28 /pmc/articles/PMC7038486/ /pubmed/32013016 http://dx.doi.org/10.3390/s20030731 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Yan, Guanghua
Li, Qiang
Guo, Dong
Meng, Xiangyu
Discovering Suspicious APT Behaviors by Analyzing DNS Activities
title Discovering Suspicious APT Behaviors by Analyzing DNS Activities
title_full Discovering Suspicious APT Behaviors by Analyzing DNS Activities
title_fullStr Discovering Suspicious APT Behaviors by Analyzing DNS Activities
title_full_unstemmed Discovering Suspicious APT Behaviors by Analyzing DNS Activities
title_short Discovering Suspicious APT Behaviors by Analyzing DNS Activities
title_sort discovering suspicious apt behaviors by analyzing dns activities
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7038486/
https://www.ncbi.nlm.nih.gov/pubmed/32013016
http://dx.doi.org/10.3390/s20030731
work_keys_str_mv AT yanguanghua discoveringsuspiciousaptbehaviorsbyanalyzingdnsactivities
AT liqiang discoveringsuspiciousaptbehaviorsbyanalyzingdnsactivities
AT guodong discoveringsuspiciousaptbehaviorsbyanalyzingdnsactivities
AT mengxiangyu discoveringsuspiciousaptbehaviorsbyanalyzingdnsactivities