2015
DOI: 10.1109/access.2015.2458581
|View full text |Cite
|
Sign up to set email alerts
|

Detecting APT Malware Infections Based on Malicious DNS and Traffic Analysis

Abstract: Advanced persistent threat (APT) is a serious threat to the Internet. With the aid of APT malware, attackers can remotely control infected machines and steal sensitive information. DNS is popular for malware to locate command and control (C&C) servers. In this paper, we propose a novel system placed at the network egress point that aims to efficiently and effectively detect APT malware infections based on malicious DNS and traffic analysis. The system uses malicious DNS analysis techniques to detect suspicious… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
72
0
3

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 146 publications
(75 citation statements)
references
References 10 publications
0
72
0
3
Order By: Relevance
“…We know that botmasters use various Internet protocols to conceal their malicious activities and avoid detection. In the past few years, some protocols have been heavily abused, and in recent years, DNS has become the main target of such malicious cyberattacks [7], such as Advanced Persistent Threat (APT) [8]. Malicious domains are basic tools in the hands of cybercriminals.…”
Section: Introductionmentioning
confidence: 99%
“…We know that botmasters use various Internet protocols to conceal their malicious activities and avoid detection. In the past few years, some protocols have been heavily abused, and in recent years, DNS has become the main target of such malicious cyberattacks [7], such as Advanced Persistent Threat (APT) [8]. Malicious domains are basic tools in the hands of cybercriminals.…”
Section: Introductionmentioning
confidence: 99%
“…Zhao et al [16] developed a new system to detect APT (Advanced Persistent Threat) malware which relied on DNS to locate command and control servers. In this system, a classifier of Malicious DNS Detector was trained by a series of feature related DNS, which employed J48 decision tree algorithm and obtained the true positive rate of 96.3% and the false positive rate of 1.7%.…”
Section: Decision Treementioning
confidence: 99%
“…Many studies focused on internal code features of the malware such as byte n-grams [5,6], OpCode [10][11][12] and PE (Portable Executable) features [13,14]. In addition, a few researchers utilized external behavior features on the system such as creating file, hiding service, opening port [15], and some works also devoted to employ external behavior features in the network such as DNS (Domain Name System) answer and TTL (Time To Live) value [16].…”
Section: The Framework For Analyzing Malware By MLmentioning
confidence: 99%
“…Many researches have made contribution to malicious domain detection [2,3,4]. Unlike the improved blacklist techniques behind their DNS traffic analysis, in this paper, we propose a new malicious domain detection technique based on traffic similarity.…”
Section: Introductionmentioning
confidence: 99%