Back to Search Start Over

Identifying APT Malware Domain Based on Mobile DNS Logging.

Authors :
Niu, Weina
Zhang, Xiaosong
Yang, GuoWu
Zhu, Jianan
Ren, Zhongwei
Source :
Mathematical Problems in Engineering; 4/6/2017, p1-9, 9p
Publication Year :
2017

Abstract

Advanced Persistent Threat (APT) is a serious threat against sensitive information. Current detection approaches are time-consuming since they detect APT attack by in-depth analysis of massive amounts of data after data breaches. Specifically, APT attackers make use of DNS to locate their command and control (C&C) servers and victims’ machines. In this paper, we propose an efficient approach to detect APT malware C&C domain with high accuracy by analyzing DNS logs. We first extract 15 features from DNS logs of mobile devices. According to Alexa ranking and the VirusTotal’s judgement result, we give each domain a score. Then, we select the most normal domains by the score metric. Finally, we utilize our anomaly detection algorithm, called Global Abnormal Forest (GAF), to identify malware C&C domains. We conduct a performance analysis to demonstrate that our approach is more efficient than other existing works in terms of calculation efficiency and recognition accuracy. Compared with Local Outlier Factor (LOF), k-Nearest Neighbor (KNN), and Isolation Forest (iForest), our approach obtains more than 99% F-M and R for the detection of C&C domains. Our approach not only can reduce data volume that needs to be recorded and analyzed but also can be applicable to unsupervised learning. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
1024123X
Database :
Complementary Index
Journal :
Mathematical Problems in Engineering
Publication Type :
Academic Journal
Accession number :
122343227
Full Text :
https://doi.org/10.1155/2017/4916953