期刊文献+

面向AI模型训练的DNS窃密数据自动生成 被引量:1

Automatic Data Generation of DNS-Based Exfiltration for AI-Model Training
下载PDF
导出
摘要 近年来,借助DNS协议良好的隐蔽性和穿透性实施数据窃取已成为诸多APT组织青睐的TTPs,在网络边界监测DNS流量进而精准发现潜在攻击行为已成为企事业单位急需建立的网络防御能力。然而,基于DNS的APT攻击所涉及的恶意样本存在难获取、数量少、活性很低等现实问题,且主流的数据增强技术不适合移植到网络攻防这个语义敏感领域,这些问题制约了AI检测模型训练。为此,本文基于DNS窃密攻击机理分析,并结合了大量真实APT案例和DNS工具,提出了一种基于攻击TTPs的DNS窃密流量数据自动生成及应用方法,设计并实现了DNS窃密流量数据自动生成系统—MalDNS,以生成大规模、高逼真度、完备度可调的DNS窃密数据集。最后,通过实验验证了生成流量数据的有效性,以及对检测模型训练的有效支撑。 In recent years,it has become the favorite TTPs of many APT organizations to implement data exfiltration by taking advantage of the good concealability and penetration of DNS protocol.Therefore,it’s imperative for enterprises and institutions to establish the defense capacity to monitor DNS traffic at the network boundary so as to accurately detect the potential attack behavior.However,datasets of DNS-based APT campaigns involve lots of practical problems such as difficulty to obtain,small quantity,and low activity.Also,the available technology of data augmentation is not suitable for transplanting to such semantic sensitive field.These problems have restricted the training of AI detection models.Therefore,based on the analysis of DNS-based exfiltration mechanism,combined with a large number of real APT cases and DNS-based exfiltration tools,we propose a method that can automatically generate traffic data based on DNS-based exfiltration TTPs.We design and establish an automatic generation system named MalDNS to generate a target DNS-based exfiltration dataset with large-scale,high fidelity,and adjustable integrity.Finally,our experiments indicate that the generated dataset is effective and can support the training of the detection models effectively.
作者 冯林 崔翔 王忠儒 甘蕊灵 刁嘉文 韩冬旭 姜海 FENG Lin;CUI Xiang;WANG Zhongru;GAN Ruiling;DIAO Jiawen;HAN Dongxu;JIANG Hai(Cyberspace Institute Advanced Technology,Guangzhou University,Guangzhou 510006,China;Chinese Academy of Cyberspace Studies,Beijing 100010,China;School of Cyberspace Secunty,Beijing University of Posts and Telecommunications,Beijing 100876,China;Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China;Beijing DigApis Technology Co.,Ltd,Beijing 100081,China)
出处 《信息安全学报》 CSCD 2021年第1期1-16,共16页 Journal of Cyber Security
基金 广东省重点领域研发计划项目(No.02019B010136003,No.2019B010137004) 国家重点研发计划项目(No.2018YFB0803504,No.2019YFA0706404)资助。
关键词 DNS窃密 数据自动生成 DNS-based exfiltration data generation
  • 相关文献

参考文献3

二级参考文献27

  • 1崔宝江,国鹏飞,王建新.基于符号执行与实际执行的二进制代码执行路径分析[J].清华大学学报(自然科学版),2009(S2):2186-2192. 被引量:1
  • 2王永杰,鲜明,陈志杰,王国玉.一种网络攻击流量生成器的设计与实现[J].计算机科学,2007,34(2):64-67. 被引量:4
  • 3Templeton S, Levitt K. A Requires Provides Model for Computer Attacks. In: Proceedings ACM Workshop on New Security Paradigms, 2001
  • 4Tao Wan,Xue Dong Yang. IntruDetector: A Software Platform for Testing Network Intrusion Detection Algorithms. In: Proceedings, IEEE 17th Computer Security Applications Conference.2001
  • 5Jonckheere E, Shah K, Bohacek S. Dynamic Modeling of Internet Traffic for Intrusion Detection. In: Proceedings American Control Conference, 2002
  • 6Sommers J, Barford P. Self-configuring network traffic generation. In: Proceedings of the 4th ACM SIGCOMM Conference on Interact Measurement, 2004
  • 7Sommers J, Yegneswaran V, Barford P. A framework for malicious workload generation. In: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, 2004
  • 8Nessus. http://www. nessus. org. 2005
  • 9Barford P, Crovella M. Generating Representative Web Workloads for Network and Server Perfromance Evaluation. In: Proceedings of ACM SIGMETRICS, 1998
  • 10Mutz D, Vigna G, Kemmerer R. An Experience Developing an IDS Simulator for the Black-Box Testing of Network Intrusion Detection Systems. In: Proceedings of ACSAC, 2003

共引文献10

同被引文献8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部