Towards Adversarial Resilience in Proactive Detection of Botnet Domain Names by using MTD

Christian Dietz, G. Rodosek, A. Sperotto, A. Pras
{"title":"Towards Adversarial Resilience in Proactive Detection of Botnet Domain Names by using MTD","authors":"Christian Dietz, G. Rodosek, A. Sperotto, A. Pras","doi":"10.1109/NOMS47738.2020.9110332","DOIUrl":null,"url":null,"abstract":"Artificial Intelligence is often part of state-of-the-art Intrusion Detection Systems. However, attackers use Artificial Intelligence to improve their attacks and circumvent IDS systems. Botnets use artificial intelligence to improve their Domain Name Generation Algorithms. Botnets pose a serious threat to networks that are connected to the Internet and are an enabler for many cyber-criminal activities (e.g., DDoS attacks, banking fraud and cyber-espionage) and cause substantial economic damage. To circumvent detection and prevent takedown actions, bot-masters use DGAs to create, maintain and hide C&C infrastructures. Furthermore, botmasters often release its source code to prevent detection, leading to numerous similar botnets that are created and maintained by different botmasters. As these botnets are based on nearly the same source code basis, they often share similar observable behavior. Current work on detection of DGAs is often based on applying machine learning techniques, as they are capable to generalize and to also detect yet unknown derivatives of a known botnets. However, these machine learning based classifiers can be circumvented by applying adversarial learning techniques. As a consequence, there is a need for resilience against adversarial learning in current Intrusion Detection Systems. In our work, we focus on adversarial learning in DNS based IDSs from the perspective of a network operator. Further, we present our concept to make existing and future machine learning based IDSs more resilient against adversarial learning attacks by applying multi-level Moving Target Defense strategies.","PeriodicalId":169457,"journal":{"name":"NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NOMS47738.2020.9110332","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Artificial Intelligence is often part of state-of-the-art Intrusion Detection Systems. However, attackers use Artificial Intelligence to improve their attacks and circumvent IDS systems. Botnets use artificial intelligence to improve their Domain Name Generation Algorithms. Botnets pose a serious threat to networks that are connected to the Internet and are an enabler for many cyber-criminal activities (e.g., DDoS attacks, banking fraud and cyber-espionage) and cause substantial economic damage. To circumvent detection and prevent takedown actions, bot-masters use DGAs to create, maintain and hide C&C infrastructures. Furthermore, botmasters often release its source code to prevent detection, leading to numerous similar botnets that are created and maintained by different botmasters. As these botnets are based on nearly the same source code basis, they often share similar observable behavior. Current work on detection of DGAs is often based on applying machine learning techniques, as they are capable to generalize and to also detect yet unknown derivatives of a known botnets. However, these machine learning based classifiers can be circumvented by applying adversarial learning techniques. As a consequence, there is a need for resilience against adversarial learning in current Intrusion Detection Systems. In our work, we focus on adversarial learning in DNS based IDSs from the perspective of a network operator. Further, we present our concept to make existing and future machine learning based IDSs more resilient against adversarial learning attacks by applying multi-level Moving Target Defense strategies.
基于MTD的僵尸网络域名主动检测中的对抗弹性研究
人工智能通常是最先进的入侵检测系统的一部分。然而,攻击者使用人工智能来改进攻击并绕过IDS系统。僵尸网络使用人工智能来改进其域名生成算法。僵尸网络对连接到互联网的网络构成严重威胁,是许多网络犯罪活动(例如,DDoS攻击,银行欺诈和网络间谍活动)的推动者,并造成重大的经济损失。为了规避检测和防止关闭行动,bot-master使用DGAs来创建、维护和隐藏C&C基础设施。此外,僵尸管理员经常发布其源代码以防止检测,导致由不同的僵尸管理员创建和维护的许多类似的僵尸网络。由于这些僵尸网络基于几乎相同的源代码基础,它们通常具有相似的可观察行为。目前检测DGAs的工作通常基于应用机器学习技术,因为它们能够泛化并检测已知僵尸网络的未知衍生品。然而,这些基于机器学习的分类器可以通过应用对抗性学习技术来绕过。因此,在当前的入侵检测系统中,需要针对对抗学习的弹性。在我们的工作中,我们从网络运营商的角度关注基于DNS的ids中的对抗性学习。此外,我们提出了我们的概念,通过应用多层次移动目标防御策略,使现有和未来基于机器学习的ids更能抵御对抗性学习攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信