期刊文献+

利用序列分析的远控木马早期检测方法研究 被引量:2

Research of Remote Access Trojan Early Detection Method Using Sequence Analysis
下载PDF
导出
摘要 远控木马(RAT)是一类以窃取机密信息为主要目的的恶意程序,严重威胁着网络空间安全。现阶段基于网络的远控木马检测方法大多对数据流的完整性有较高的要求,其检测存在一定程度的滞后。在分析远控木马通信会话建立后初期流量的序列特性的基础上,提出了一种利用序列分析的远控木马早期检测方法。该方法以远控木马被控端和控制端交互中第一条TCP流为分析对象,重点关注流中由内部主机向外部网络发送且数据包传输层负载大于α字节的第一个数据包(上线包)及其后续数个数据包,从中提取包含传输负载大小序列、传输字节数和时间间隔在内的三维特征并运用机器学习算法构建了高效的早期检测模型。实验结果表明,该方法具备快速检测远控木马的能力,其通过远控木马会话建立后初期的少量数据包即可高准确率地检测出远控木马流量。 Remote access Trojan(RAT) is a kind of malware. The main intent of RAT is to steal confidential information and it seriously threatens the security of cyberspace. Most of current network-based RAT detection methods have high requirement on the integrity of the data stream, and their detection are delayed to a certain extent. Based on the analysis of the sequence characteristics of the initial traffic of RAT after the session is established, this paper proposes an RAT early detection method using sequence analysis. The proposed method takes the first TCP stream in the interaction between the RAT ’ s controlled and control ends as the analysis object, and focuses on the first packet that is sent from the internal host to the external network in the stream and whose transmission layer payload is greater than α bytes(called information return packet) as well as several subsequent packets. In the proposed method, three-dimensional features including transmission payload size sequence,transmission byte and time interval are extracted, and a machine learning algorithm is used to construct an efficient early detection model. Experimental results show that this method has the ability to quickly detect RAT, and it can detect RAT traffic with a high accuracy through a small number of data packets in the early stage.
作者 王晨 郭春 申国伟 崔允贺 WANG Chen;GUO Chun;SHEN Guowei;CUI Yunhe(School of Computer Science and Technology,Guizhou University,Guiyang 550025,China;State Key Laboratory of Public Big Data,Guiyang 550025,China)
出处 《计算机科学与探索》 CSCD 北大核心 2021年第12期2315-2326,共12页 Journal of Frontiers of Computer Science and Technology
基金 国家自然科学基金(61802081) 贵州省科学技术基金(黔科合基础[2020]1Y268)。
关键词 远控木马(RAT) 序列分析 早期检测 网络通信行为 remote access Trojan(RAT) sequence analysis early detection network communication behavior
  • 相关文献

参考文献3

二级参考文献36

  • 1李世淙,云晓春,张永铮.一种基于分层聚类方法的木马通信行为检测模型[J].计算机研究与发展,2012,49(S2):9-16. 被引量:12
  • 2国家互联网应急中心.CNCERT互联网安全威胁报告[EB/OL].http://www.cert.org.cn/publish/main/upload/File/2014monthlyl2.pdf, 2014-12.
  • 3Kolter J z, Maloof M A. Learning to detect and classify malicious executables in the wild[J]. The Journal of Machine Learning Research, 2006,( 7): 2721-2744.
  • 4Gao D, Reiter M K, Song D. Binhunt: Automatically finding semantic differences in binary programs[M]. Heidelberg: Springer Berlin, 2008.
  • 5Chen Q Z, Cheng 1K, Gu YJ. Classification algorithms of Trojan horse detection based on behavior[C] International Conference on IEEE, 2009, (2): 510-513.
  • 6liu Yu feng, Zhang Li-wei, Liang Jian, et al. Detecting trojan horses based on system behavior using machine learning method[C]// Proceedings of the Ninth International Conference on Machine Learning and Cybernetics, Qingdao, 2010,(7):11-14.
  • 7Bayer U, Comparetti P M, Hlauschek C, et al. Scalable, Behavior- Based Malware Clustering[C]//NDSS. 2009, (9): 8-11.
  • 8Kirda E, Kruegel C, Banks G, et al. Behavior-based Spyware Detection[C] Usenix Security,2006.
  • 9Qin J, "Fan H, Si Q, et al. A Trojan horse Detection Technology Based on Behavior Analysis[C]//Proceedings of Wireless Communications Networking and Mobile Computing (WiCOM), 2010 6th International Conference on,2010: 1-4.
  • 10Valenti S, Rossi D, Dainotti A, et al. Reviewing traffic classification[M]. Heidelberg: Springer Berlin ,2013.

共引文献24

同被引文献22

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部