浏览全部资源
扫码关注微信
1. 中国电子信息产业发展研究院网络安全研究所,北京 100846
2. 国家计算机网络与信息安全管理中心,北京 100029
[ "张猛(1988- ),男,山东兖州人,博士,中国电子信息产业发展研究院助理研究员,主要研究方向为网络空间安全、域名安全、区块链技术" ]
[ "孙昊良(1983- ),男,辽宁朝阳人,博士,国家计算机网络与信息安全管理中心高级工程师,主要研究方向为威胁检测与信息对抗、安全态势感知" ]
[ "杨鹏(1982- ),男,内蒙古集宁人,博士,国家计算机网络与信息安全管理中心高级工程师,主要研究方向为信息安全、人工智能" ]
网络出版日期:2020-01,
纸质出版日期:2020-01-25
移动端阅览
张猛, 孙昊良, 杨鹏. 基于改进卷积神经网络识别DNS隐蔽信道[J]. 通信学报, 2020,41(1):169-179.
Meng ZHANG, Haoliang SUN, Peng YANG. Identification of DNS covert channel based on improved convolutional neural network[J]. Journal on communications, 2020, 41(1): 169-179.
张猛, 孙昊良, 杨鹏. 基于改进卷积神经网络识别DNS隐蔽信道[J]. 通信学报, 2020,41(1):169-179. DOI: 10.11959/j.issn.1000-436x.2020017.
Meng ZHANG, Haoliang SUN, Peng YANG. Identification of DNS covert channel based on improved convolutional neural network[J]. Journal on communications, 2020, 41(1): 169-179. DOI: 10.11959/j.issn.1000-436x.2020017.
为了全面有效地识别DNS隐蔽信道,对多种DNS隐蔽信道软件的实现方式进行了研究,提出了一种基于改进的卷积神经网络的 DNS 隐蔽信道识别方法。基于真实的校园网流量进行了实验,结果表明,所提方法可检测出全部22种数据交互模式的DNS隐蔽信道,并且具有识别未知的DNS隐蔽信道流量的能力。其识别性能的全面性和准确率相较于现有方法有显著提高。
In order to effectively identify the multiple types of DNS covert channels
the implementation of different sorts of DNS covert channel software was studied
and a detection based on the improved convolutional neural network was proposed.The experimental results
grounded upon the campus network traffic
show that the detection can identify twenty-two kinds of data interaction modes of DNS covert channels and is able to identify the unknown DNS covert channel traffic.The proposed method outperforms the existing methods.
CROTTI M , DUSI M , GRINGOLI F , et al . Detecting HTTP tunnels with statistical mechanisms [C ] // IEEE International Conference on Communications . IEEE , 2007 : 6162 - 6168 .
DUSI M , CROTTI M , GRINGOLI F , et al . Tunnel hunter:detecting application-layer tunnels with statistical fingerprinting [J ] . Computer Networks , 2009 , 53 ( 1 ): 81 - 97 .
CASAS P , MAZEL J , OWEZARSKI P . MINETRAC:mining flows for unsupervised analysis & semi-supervised classification [C ] // The 23rd International Teletraffic Congress . 2011 : 87 - 94 .
MARCHAL S , FRANCIS J , WAGNER C , et al . DNSSM:a large scale passive DNS security monitering framework [J ] . Network Operations& Management Symposium IEEE , 2012 , 131 ( 5 ): 988 - 993 .
KARASARIDIS A , MEIER-HELLSTEM K , HOEFLIN D . NIS04-2:detection of DNS anomalies using flow data analysis [C ] // Global Telecommunications Conference . IEEE , 2006 : 1 - 6 .
SHERIDAN S , KEANE A . Detection of DNS based covert channels [C ] // The 14th European Conference on Cyber Warfare and Security (ECCWS) . 2015 : 66 - 77 .
SHAFIEIAN S , SMITH D , ZULKERNINE M . Detecting DNS tunneling using ensemble learning [C ] // International Conference on Network and System Security . 2017 : 112 - 127 .
NUSSBAUM L , NEYRON P , RICHARD O . On robust covert chan-nels inside DNS [J ] . IFIP Advances in Information&Communication Technology , 2009 , 297 ( 7 ): 51 - 62 .
AIELLO M , MERLO A , PAPALEO G . Performance assessment and analysis of DNS tunneling tools [J ] . Logic Journal of IGPL , 2013 , 21 ( 4 ): 592 - 602 .
NADLER A , AMINOV A , SHABTAI A . Detection of malicious and low throughput data exfiltration over the DNS protocol [J ] . Computer& Security , 2019 , 80 ( 10 ): 36 - 53 .
FARNHAM G , ATLASIS A . Detecting DNS tunneling [C ] // SANS Institute InfoSec Reading Room . 2013 : 1 - 32 .
BILGE L , KIRDA E , KRUEGEL C , et al . EXPOSURE:finding malicious domains using passive DNS analysis [C ] // The Network and Distributed System Security Symposium . 2011 : 68 - 82 .
LENCUN Y , BOTTOU L , BENGIO Y . Gradient-based learning applied to document recognition [J ] . Proceedings of the IEEE , 1998 , 862 ( 10 ): 2278 - 2324 .
0
浏览量
1444
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构