semantic based dns forensics
play

Semantic based DNS Forensics Samuel Marchal, J er ome Fran cois, - PowerPoint PPT Presentation

samuel.marchal@uni.lu 3/12/12 Semantic based DNS Forensics Samuel Marchal, J er ome Fran cois, Radu State and Thomas Engel Motivations Semantic analysis Experiments and Results Conclusion Outline 1 Motivations 2 Semantic analysis 3


  1. samuel.marchal@uni.lu 3/12/12 Semantic based DNS Forensics Samuel Marchal, J´ erˆ ome Fran¸ cois, Radu State and Thomas Engel

  2. Motivations Semantic analysis Experiments and Results Conclusion Outline 1 Motivations 2 Semantic analysis 3 Experiments and Results 4 Conclusion 2 / 17

  3. Motivations Semantic analysis Experiments and Results Conclusion Outline 1 Motivations 2 Semantic analysis 3 Experiments and Results 4 Conclusion 3 / 17

  4. Motivations Semantic analysis Experiments and Results Conclusion DNS misuse DNS: Domain Name System is the support of many malicious activities · malware updates · botnet C&C · phishing DNS recursive server · backdoor communications · etc. DNS resolution DNS resolution DNS replies: Authoritative DNS server connection to 123.45.67.8 76.54.32.1 for malicious domains phishing website 56.7.89.10 DNS requests: malwareupdate.com commandandcontrol.net request for 123.45.67.8 malware update Requests forwarding phishing compromised web servers request to C&C host C&C server 56.7.89.10 malware update bots 4 / 17

  5. Motivations Semantic analysis Experiments and Results Conclusion DNS misuse DNS: Domain Name System is the support of many malicious activities DNS recursive server DNS resolution DNS resolution DNS replies: 76.54.32.1 Authoritative DNS server 56.7.89.10 76.54.32.1 for malicious domains DNS requests: malwareupdate.com commandandcontrol.net connection to phishing website request for malware update 123.45.67.8 Requests forwarding compromised phishing host request to C&C web server C&C server 56.7.89.10 malware update bots 4 / 17

  6. Motivations Semantic analysis Experiments and Results Conclusion DNS for forensic Why proceed DNS analysis for forensic purposes ? ◮ find proof of infection (malicious domains requests) ◮ reduced amount of data to analyse: DNS is a meager subset of network traffic ◮ DNS analysis keeps users’ anonymity = ⇒ useful as a first step before in-depth analysis 5 / 17

  7. Motivations Semantic analysis Experiments and Results Conclusion DNS for forensic Why proceed DNS analysis for forensic purposes ? ◮ find proof of infection (malicious domains requests) ◮ reduced amount of data to analyse: DNS is a meager subset of network traffic ◮ DNS analysis keeps users’ anonymity = ⇒ useful as a first step before in-depth analysis Issue: How do we know if a domain is malicious ? 5 / 17

  8. Motivations Semantic analysis Experiments and Results Conclusion State of the art Identification of malicious domains: ◮ User reports + manual checking ◮ DNS packet fields analysis + classification via machine learning algorithm: ◮ domain records removed: data is no longer available = ⇒ problematic for forensic analysis ◮ Domain name based analysis: ◮ number of domain levels ◮ relative position of labels ◮ domain length ◮ etc. 6 / 17

  9. Motivations Semantic analysis Experiments and Results Conclusion Outline 1 Motivations 2 Semantic analysis 3 Experiments and Results 4 Conclusion 7 / 17

  10. Motivations Semantic analysis Experiments and Results Conclusion Analyse domain semantic ◮ Domain names are meant to be meaningful ◮ Observations: malicious domains often use words from the same semantic fields: ◮ www.visa-sweden.mastercard.forever4c.com ◮ myvodafone.vodafone-security-update78.systemknight.com ◮ paypal.com-us.webscr.cmd-homeelocale.gumuspena.com ◮ Issue: single domains are not significant enough ◮ = ⇒ Group domains according to common features (IP address, etc.) ◮ Knowing group of malicious and legitimate domains = ⇒ deduce if an unknown group is malicious or not 8 / 17

  11. Motivations Semantic analysis Experiments and Results Conclusion Features extraction Splitting of domain name: myvodafone.vodafone-security-update78.systemknights.com myvodafone.vodafone-security-update78.systemknights.com ‘ . ’ splitting ‘ - ’ splitting vodafone-security-update78 number extraction update78 word myvodafone systemknights segmentation my vodafone vodafone security update 78 system knights ◮ distword = { ( my , 0 . 125) , ( vodafone , 0 . 25) , ( security , 0 . 125) , ... } 9 / 17

  12. Motivations Semantic analysis Experiments and Results Conclusion Semantic relatedness evaluation How to evaluate semantic similarity between two sets of domain names ? = ⇒ between two words: Wordnet, Disco: ◮ calculate a similarity score (semantic relatedness) between 2 words ◮ give the n most related words to w ◮ based on dictionary (Wikipedia, BNC, PubMed, etc.) � ( r , w ) ∈ T ( w 1) ∩ T ( w 2) I ( w 1 , r , w )+ I ( w 2 , r , w ) sim ( w 1 , w 2 ) = � ( r , w ) ∈ T ( w 1) I ( w 1 , r , w )+ � ( r , w ) ∈ T ( w 2) I ( w 2 , r , w ) = ⇒ use this metric in new ones 10 / 17

  13. Motivations Semantic analysis Experiments and Results Conclusion Semantic metrics 3 metrics defined to compare two sets of domains: Assuming two domain sets A and B and the associated extracted word sets W A and W B with the occurrence frequencies distword we have: Sim 1 ( A , B ) = � � w B ∈ W B sim ( w A , w B ) w A ∈ W A Sim 2 ( A , B ) = � � w B ∈ W B sim ( w A , w B ) × distword w A , W A × distword w B , W B w A ∈ W A Sim ′ 3 ( A , B ) = � � w ′ ∈ Disco ( w , n ) sim ( w , w ′ ) × distword w ′ , W B w ∈ W A = ⇒ Sim 3 ( A , B ) = Sim ′ 3 ( A , B ) + Sim ′ 3 ( B , A ) 11 / 17

  14. Motivations Semantic analysis Experiments and Results Conclusion Outline 1 Motivations 2 Semantic analysis 3 Experiments and Results 4 Conclusion 12 / 17

  15. Motivations Semantic analysis Experiments and Results Conclusion Similarity metrics efficiency Comparison pair-wise of domains sets (Sim 3 ( A , B ) ) ◮ 10 sets of around 13,000 domains each ◮ 5 legitimate (Alexa + passive DNS) ◮ 5 malicious (PhishTank, DNS-BH, MDL) leg-5 leg-4 leg-3 leg-2 leg-1 mal-5 mal-4 mal-3 mal-2 mal-1 0.776 0.795 0.793 0.789 0.785 0.955 0.962 0.965 0.975 mal-2 0.782 0.800 0.798 0.797 0.797 0.965 0.968 0.973 mal-3 0.772 0.796 0.793 0.788 0.784 0.951 0.962 mal-4 0.783 0.804 0.804 0.800 0.796 0.953 mal-5 0.769 0.785 0.784 0.782 0.772 leg-1 0.946 0.948 0.952 0.938 leg-2 0.915 0.924 0.922 leg-3 0.936 0.934 leg-4 0.935 0.7 0.76 0.82 0.88 0.94 1.00 13 / 17

  16. Motivations Semantic analysis Experiments and Results Conclusion Size of domains sets Similarity metrics able to distinguish legitimate from malicious sets of domains: ◮ for big set (13,000 domains): ok !! ◮ minimum number of domains in a set to evaluate it ? Value of Sim1 between datasets 0.7 leg 0.6 mal 0.5 0.4 3 0.3 m i S 0.2 0.1 0 0 50 100 150 200 # of domains in the dataset 14 / 17

  17. Motivations Semantic analysis Experiments and Results Conclusion Outline 1 Motivations 2 Semantic analysis 3 Experiments and Results 4 Conclusion 15 / 17

  18. Motivations Semantic analysis Experiments and Results Conclusion Conclusion Technique for domains sets comparison: ◮ semantic similarity scoring ◮ apply to identification of malicious domain set ◮ useful for first step of forensic analysis Results: ◮ able to distinguish malicious from legitimate domains... ◮ ... for sets of at least 10 domains Future works: ◮ improve similarity metrics ◮ correlate with IP Flow records 16 / 17

  19. samuel.marchal@uni.lu 3/12/12 Semantic based DNS Forensics Samuel Marchal, J´ erˆ ome Fran¸ cois, Radu State and Thomas Engel

Recommend


More recommend