期刊文献+

基于DNS流量和威胁情报的APT检测 被引量:12

APT Detection based on DNS Traffic and Threat Intelligence
下载PDF
导出
摘要 高级持续性威胁(Advanced Persistent Threat,APT)攻击是经过精心策划的高隐蔽性攻击,具有较高的检测难度。但是在APT攻击过程中,内外网通信是必不可少的一环,攻击者往往采用C&C服务器方式或是DNS隐蔽信道方式进行通信。针对在APT攻击中广泛采用的几种隐蔽通信手段,结合了机器学习和威胁情报技术对DNS流量进行分析,在现有研究基础上,提出了新的基于威胁情报库的自进化检测算法,并取得较好的检测效果。 APT(Advanced Persistent Threat) attacks are carefully planned,sophisticated and highly- covert attacks. and it is of great difficulty to detect APT attacks. However,in the process of APT attacks,communication between the internal and external network is an essential part. Attackers often use CC server or DNS covert channel for covert communication. For several covert methods of communication widely used in APT attacks,Domain Name System Traffic is analyzed in combination with machine learning and Threat Intelligence Technology. On the basis of the existing research,the new self- evolution detection algorithm is proposed,and fairly good results also achieved.
出处 《信息安全与通信保密》 2016年第7期84-88,共5页 Information Security and Communications Privacy
基金 公安部重点实验室基金(No.C14612)
关键词 APT DNS 威胁情报 APT DNS threat intelligence
  • 相关文献

参考文献9

  • 1NIST. SP 800- 39, Managing Information Security Risk : Or- ganization, Mission, and Information System View[ S]. USA: NIST. 2011: 60.
  • 2陈剑锋,王强,伍淼.网络APT攻击及防范策略[J].信息安全与通信保密,2012,10(7):24-27. 被引量:31
  • 3Phunter.C&C控制服务的设计和侦测方法综述[EB/OL].北京:w00Yun知识库.(2015-11-06)[2016-05-25].ht-tp://drops.wooyun.org/ti~10232.
  • 4IMPERVA. Advanced Persistent Threat [ R ]. USA : IMPER- VA,2012.
  • 5腾讯电脑管家.黑暗幽灵(DCM)木马详细分析[EB/OL].上海:FreeBuf.(2016一04—13)[2016—05-25].http://WWW.freebuf.com/articles/system/t01447.html.
  • 6云晓春.威胁情报助力互联网应急响应[J].信息安全与通信保密,2015,13(10):21-21. 被引量:9
  • 7LASOTA K, KOZAKIEWICZ A. Analysis of the Similarities in Malicious DNS Domain Names[ C]. In The 1st FTRA Interna- tional Workshop on Convergence Security in Pervasive Envi- ronments, Loutraki, Greece, June 28-30, 2011: 1-6.
  • 8SPRING J M, METCALF L B, STONER E. Correlating Do- main Registrations and DNS First Activity in General and for Malware[ C ]. In Securing and Trusting Intemet Names, NPL, Teddington, UK, April 4-5, 2011.
  • 9杨泽明,李强,刘俊荣,刘宝旭.面向攻击溯源的威胁情报共享利用研究[J].信息安全研究,2015,1(1):31-36. 被引量:27

二级参考文献8

共引文献61

同被引文献103

引证文献12

二级引证文献121

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部