MORTON: Detection of Malicious Routines in Large-Scale DNS Traffic

08/05/2020
by   Hen Tzaban, et al.
0

In this paper, we present MORTON, a system that identifies compromised enterprise devices (bots) without relying on malicious domain name detection. To achieve this goal, MORTON processes DNS requests made by enterprise devices in order to identify routine communication to disreputable host names. With its compact representation of the input data and use of efficient signal processing and a neural network for classification, MORTON is designed to be accurate, robust, and scalable. We evaluate MORTON using a large dataset of corporate DNS logs and compare MORTON to two recently proposed systems aimed at detecting malware communication. The results demonstrate that while MORTON's accuracy is comparable to that of the two systems for beaconing detection, it outperforms the systems in terms of its ability to detect sophisticated bot communication techniques such as multi-stage channels, as well as its robustness and efficiency. MORTON was also deployed to monitor real-world DNS traffic made by nine world-wide enterprise over the course of 30 days. The real-world results include previously unreported threats, and a low false positive rate, thus demonstrating the effectiveness of MORTON for real-world, unlabelled environments.

READ FULL TEXT

page 4

page 5

research
03/26/2021

ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation

The Linux shell is a command-line interpreter that provides users with a...
research
05/04/2022

Early Detection of Spam Domains with Passive DNS and SPF

Spam domains are sources of unsolicited mails and one of the primary veh...
research
04/09/2019

Malicious Overtones: hunting data theft in the frequency domain with one-class learning

A method for detecting electronic data theft from computer networks is d...
research
10/04/2019

Digesting Network Traffic for Forensic Investigation Using Digital Signal Processing Techniques

One of the most important practices of cybercrime investigations is to s...
research
06/12/2019

An Effective Payload Attribution Scheme for Cybercriminal Detection Using Compressed Bitmap Index Tables and Traffic Downsampling

Payload attribution systems (PAS) are one of the most important tools of...
research
03/05/2020

DANTE: A framework for mining and monitoring darknet traffic

Trillions of network packets are sent over the Internet to destinations ...
research
06/17/2020

MBTree: Detecting Encryption RAT Communication Using Malicious Behavior Tree

A key challenge for cybersecurity defense is to detect the encryption Re...

Please sign up or login with your details

Forgot password? Click here to reset