利用DNS进行恶意负载分发的分析

Ishmael Dube, G. Wells
{"title":"利用DNS进行恶意负载分发的分析","authors":"Ishmael Dube, G. Wells","doi":"10.1109/IMITEC50163.2020.9334104","DOIUrl":null,"url":null,"abstract":"The Domain Name System (DNS) protocol is a fundamental part of Internet activities that can be abused by cybercriminals to conduct malicious activities. Previous research has shown that cybercriminals use different methods, including the DNS protocol, to distribute malicious content, remain hidden and avoid detection from various technologies that are put in place to detect anomalies. This allows botnets and certain malware families to establish covert communication channels that can be used to send or receive data and also distribute malicious payloads using the DNS queries and responses. Cybercriminals use the DNS to breach highly protected networks, distribute malicious content, and exfiltrate sensitive information without being detected by security controls put in place by embedding certain strings in DNS packets. This research undertaking analysed the use of the DNS in detecting domains and channels that are used for distributing malicious payloads. Passive DNS data which replicate DNS queries on name servers to detect anomalies in DNS queries was evaluated and analysed in order to detect malicious payloads. The research characterised the malicious payload distribution channels by analysing passive DNS traffic and modelled the DNS query and response patterns used during malicious payload distribution. The research found that it is possible to detect malicious payload distribution channels through the analysis of DNS TXT resource records.","PeriodicalId":349926,"journal":{"name":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An Analysis of the Use of DNS for Malicious Payload Distribution\",\"authors\":\"Ishmael Dube, G. Wells\",\"doi\":\"10.1109/IMITEC50163.2020.9334104\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Domain Name System (DNS) protocol is a fundamental part of Internet activities that can be abused by cybercriminals to conduct malicious activities. Previous research has shown that cybercriminals use different methods, including the DNS protocol, to distribute malicious content, remain hidden and avoid detection from various technologies that are put in place to detect anomalies. This allows botnets and certain malware families to establish covert communication channels that can be used to send or receive data and also distribute malicious payloads using the DNS queries and responses. Cybercriminals use the DNS to breach highly protected networks, distribute malicious content, and exfiltrate sensitive information without being detected by security controls put in place by embedding certain strings in DNS packets. This research undertaking analysed the use of the DNS in detecting domains and channels that are used for distributing malicious payloads. Passive DNS data which replicate DNS queries on name servers to detect anomalies in DNS queries was evaluated and analysed in order to detect malicious payloads. The research characterised the malicious payload distribution channels by analysing passive DNS traffic and modelled the DNS query and response patterns used during malicious payload distribution. The research found that it is possible to detect malicious payload distribution channels through the analysis of DNS TXT resource records.\",\"PeriodicalId\":349926,\"journal\":{\"name\":\"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)\",\"volume\":\"38 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IMITEC50163.2020.9334104\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMITEC50163.2020.9334104","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

域名系统(DNS)协议是互联网活动的基本组成部分,可被网络犯罪分子滥用进行恶意活动。先前的研究表明,网络犯罪分子使用不同的方法,包括DNS协议,来传播恶意内容,保持隐藏,避免被各种检测异常的技术检测到。这允许僵尸网络和某些恶意软件家族建立隐蔽的通信通道,可用于发送或接收数据,并使用DNS查询和响应分发恶意有效载荷。网络犯罪分子利用DNS破坏高度保护的网络,传播恶意内容,泄露敏感信息,而不被通过在DNS数据包中嵌入特定字符串的安全控制检测到。这项研究工作分析了DNS在检测用于分发恶意有效载荷的域和通道中的使用。被动DNS数据在名称服务器上复制DNS查询以检测DNS查询中的异常情况,以便检测恶意有效载荷。通过对被动DNS流量的分析,对恶意负载分发通道进行了表征,并对恶意负载分发过程中使用的DNS查询和响应模式进行了建模。研究发现,通过分析DNS TXT资源记录,可以检测出恶意负载分发渠道。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An Analysis of the Use of DNS for Malicious Payload Distribution
The Domain Name System (DNS) protocol is a fundamental part of Internet activities that can be abused by cybercriminals to conduct malicious activities. Previous research has shown that cybercriminals use different methods, including the DNS protocol, to distribute malicious content, remain hidden and avoid detection from various technologies that are put in place to detect anomalies. This allows botnets and certain malware families to establish covert communication channels that can be used to send or receive data and also distribute malicious payloads using the DNS queries and responses. Cybercriminals use the DNS to breach highly protected networks, distribute malicious content, and exfiltrate sensitive information without being detected by security controls put in place by embedding certain strings in DNS packets. This research undertaking analysed the use of the DNS in detecting domains and channels that are used for distributing malicious payloads. Passive DNS data which replicate DNS queries on name servers to detect anomalies in DNS queries was evaluated and analysed in order to detect malicious payloads. The research characterised the malicious payload distribution channels by analysing passive DNS traffic and modelled the DNS query and response patterns used during malicious payload distribution. The research found that it is possible to detect malicious payload distribution channels through the analysis of DNS TXT resource records.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信