Computer Engineering and Applications ›› 2014, Vol. 50 ›› Issue (15): 82-86.

Previous Articles     Next Articles

DNS anomaly detection based on Counting Bloom Filter

HU Beibei1, PENG Yanbing2, CHENG Guang3   

  1. 1.Wuhan Research Institute of Posts and Telecommunications, Wuhan 430074, China
    2.Fiberhome Communication Technologies Co. Ltd, Nanjing 210019, China
    3.Department of Computer Science and Engineering, Southeast University, Nanjing 211189, China
  • Online:2014-08-01 Published:2014-08-04

基于Counting Bloom Filter的DNS异常检测

胡蓓蓓1,彭艳兵2,程  光3   

  1. 1.武汉邮电科学研究院,武汉 430074
    2.烽火通信科技股份有限公司,南京 210019
    3.东南大学 计算机科学与工程系,南京 211189

Abstract: Considering that DNS query failure can serve as communication evidence for activities of malware, this paper provides a DNS anomaly detection method based on Counting Bloom Filter with failure data as its entry point. This method conducts clustering towards domain names queried and IP which initiates the query, using revertible hash function with semantic features. After the clustering, the few Top N hash strings will be worked backwards to get the dominating shorting strings, which will be spliced according to the results of homology judgment. Experimental results prove that this method can effectively identify the anomaly in DNS flow, thus can be applied to early screening and later validation of anomaly detections, such as botnet and DDoS attack.

Key words: Domain Name System(DNS) query failure, Counting Bloom Filter, anomaly detection

摘要: 鉴于失败的DNS查询(failed DNS query)能提供恶意网络活动的证据,以DNS查询失败的数据为切入口,提出一种轻量级的基于Counting Bloom Filter的DNS异常检测方法。该方法使用带语义特征的可逆哈希函数对被查询的域名及发起查询的IP进行快速的聚类和还原。实验结果证明该方法能以较少的空间占用和较快的计算速度有效识别出DNS流量中的异常,适用于僵尸网络、分布式拒绝服务(DDoS)攻击等异常检测的前期筛选和后期验证。

关键词: 域名系统(DNS)查询失败, 计数型布隆过滤器, 异常检测