期刊文献+

基于LSTM的DNS隐蔽信道检测方法 被引量:1

DNS covert channel detection method based on LSTM
下载PDF
导出
摘要 DNS滥用已成为网络空间安全治理中面临的最具挑战性的威胁之一。针对现有检测方法多以DNS请求流量为研究对象,忽略了响应流量特征的问题,提出一种基于长短期记忆网络(Long-Short Term Memory,LSTM)的DNS隐蔽信道检测方法。综合分析请求与响应流量特征,提取响应流量中时间戳、TTL、响应分组长度等特征点,并构建LSTM模型进行训练。实验结果表明,该方法在准确率、F1评分等指标方面取得了良好的结果,较现有方法有显著提高。 DNS abuse has become one of the most challenging threats in cyberspace security governance.As the existing detection methods mostly focus on DNS request traffic but ignore the characteristics of response traffic,this paper proposed a DNS covert channel detection method based on Long Short Term Memory(LSTM).The characteristics of request and response traffic were comprehensively analyzed and the feature points such as timestamp,TTL and response packet length from response traffic were extracted,then the LSTM model was constructed for training.The experimental results show that the proposed method achieves good results in accuracy,F1 score and other indicators,which are significantly improved compared with existing methods.
作者 陈解元 Chen Xieyuan(National Computer Network Emergency Response Technical Team/Coordination Center of China(CNCERT/CC),Beijing 100032,China)
出处 《信息技术与网络安全》 2022年第4期60-64,89,共6页 Information Technology and Network Security
关键词 DNS隐蔽信道 机器学习 长短期记忆网络 DNS covert channel machine learning Long-Short Term Memory(LSTM)
  • 相关文献

参考文献6

二级参考文献21

  • 1KAMINSKY D. The black OPS of DNS[A]. Proceedings of the Black Hat USA 2004[C]. Las Vegas, 2004. 被引量:1
  • 2LEIJENHORST T V, CHIN K-W, LOWED. On the viability and performance of DNS tunneling[A]. Proceedings of the 5th International Conference on Information Technology and Applications[C]. Cairns, Australia, 2008. 被引量:1
  • 3NUSSBAUM L, NEYRON P, RICHARD O. On robust covert channels inside DNS[A]. Proceedings of the 24th IF1P International Security Conference[C]. Pafos, Cyprus, 2009. 被引量:1
  • 4MERLO A, PAPALEO G, VENEZIANO S, et al. A comparativeperformance evaluation of DNS tunneling tools[A]. Proceedings of the 5th International Conference on Complex, Intelligent, and Soitware Intensive Systems[C]. Seoul, Korea, 2011.84-91. 被引量:1
  • 5REVELLI A, LEIDECKER N. Introducing heyoka: DNS tunneling 2.0[A]. Proceedings of the SOURCE Conference Boston[C]. Boston, 2009. 被引量:1
  • 6BORN K. PSUDP: a passive approach to network-wide covert communication[A]. Proceedings of the Black Hat USA 2010[C]. Las Vegas, 2010. 被引量:1
  • 7ZANDER S, ARMITAGE G, BRANCH P. A survey of covert channels and countermeasures in computer network protocols[J]. Communications Surveys & Tutorials, IEEE, 2007, 9 (3): 44-57. 被引量:1
  • 8DUSI M, CROTTI M, GRINGOLI F, et al. Tunnel hunter: detecting application-layer tunnels with statistical fingerprinting[J]. Computer Networks, 2009, 53 (1): 81-97. 被引量:1
  • 9ANDERSSON B, EKMAN E. Iodine[EB/OL]. http://eode.kryo.se/ iodine/, 2011. 被引量:1
  • 10BORN K, GUSTAFSON D. NgViz: detecting DNS tunnels through N-gram visualization and quantitative analysis[A]. Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research[C]. Oak Ridge, Tennessee, 2010. 1-4. 被引量:1

共引文献38

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部