CN107612911B - Method for detecting infected host and C & C server based on DNS traffic - Google Patents
Method for detecting infected host and C & C server based on DNS traffic Download PDFInfo
- Publication number
- CN107612911B CN107612911B CN201710850732.3A CN201710850732A CN107612911B CN 107612911 B CN107612911 B CN 107612911B CN 201710850732 A CN201710850732 A CN 201710850732A CN 107612911 B CN107612911 B CN 107612911B
- Authority
- CN
- China
- Prior art keywords
- domain name
- dns
- server
- information
- random
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 24
- 241000700605 Viruses Species 0.000 abstract description 6
- 238000001514 detection method Methods 0.000 abstract description 5
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 abstract description 2
- 238000005516 engineering process Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (9)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201710850732.3A CN107612911B (en) | 2017-09-20 | 2017-09-20 | Method for detecting infected host and C & C server based on DNS traffic |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201710850732.3A CN107612911B (en) | 2017-09-20 | 2017-09-20 | Method for detecting infected host and C & C server based on DNS traffic |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN107612911A CN107612911A (en) | 2018-01-19 |
| CN107612911B true CN107612911B (en) | 2020-05-01 |
Family
ID=61060185
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201710850732.3A Active CN107612911B (en) | 2017-09-20 | 2017-09-20 | Method for detecting infected host and C & C server based on DNS traffic |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN107612911B (en) |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107645503B (en) * | 2017-09-20 | 2020-01-24 | 杭州安恒信息技术股份有限公司 | A rule-based detection method for malicious domain names belonging to DGA family |
| CN109120733B (en) * | 2018-07-20 | 2021-06-01 | 杭州安恒信息技术股份有限公司 | A detection method using DNS for communication |
| CN109474593B (en) * | 2018-11-09 | 2021-04-20 | 杭州安恒信息技术股份有限公司 | Method for identifying C & C periodic loop back connection behaviors |
| CN113315737A (en) * | 2020-02-26 | 2021-08-27 | 深信服科技股份有限公司 | APT attack detection method and device, electronic equipment and readable storage medium |
| CN111654487B (en) * | 2020-05-26 | 2022-04-19 | 南京云利来软件科技有限公司 | DGA domain name identification method based on bypass network full flow and behavior characteristics |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2007010395A2 (en) * | 2005-07-22 | 2007-01-25 | Alcatel Lucent | Dns based enforcement for confinement and detection of network malicious activities |
| CN105072214A (en) * | 2015-08-28 | 2015-11-18 | 携程计算机技术(上海)有限公司 | C&C domain name identification method based on domain name feature |
| CN105577660A (en) * | 2015-12-22 | 2016-05-11 | 国家电网公司 | DGA domain name detection method based on random forest |
| CN106576058A (en) * | 2014-08-22 | 2017-04-19 | 迈克菲股份有限公司 | System and method to detect domain generation algorithm malware and systems infected by such malware |
-
2017
- 2017-09-20 CN CN201710850732.3A patent/CN107612911B/en active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2007010395A2 (en) * | 2005-07-22 | 2007-01-25 | Alcatel Lucent | Dns based enforcement for confinement and detection of network malicious activities |
| CN106576058A (en) * | 2014-08-22 | 2017-04-19 | 迈克菲股份有限公司 | System and method to detect domain generation algorithm malware and systems infected by such malware |
| CN105072214A (en) * | 2015-08-28 | 2015-11-18 | 携程计算机技术(上海)有限公司 | C&C domain name identification method based on domain name feature |
| CN105577660A (en) * | 2015-12-22 | 2016-05-11 | 国家电网公司 | DGA domain name detection method based on random forest |
Also Published As
| Publication number | Publication date |
|---|---|
| CN107612911A (en) | 2018-01-19 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN112866023B (en) | Network detection method, model training method, device, equipment and storage medium | |
| CN110719291B (en) | Network threat identification method and identification system based on threat information | |
| CN107612911B (en) | Method for detecting infected host and C & C server based on DNS traffic | |
| Antonakakis et al. | From {Throw-Away} traffic to bots: Detecting the rise of {DGA-Based} malware | |
| US10721245B2 (en) | Method and device for automatically verifying security event | |
| CN110099059B (en) | Domain name identification method and device and storage medium | |
| CN107645503B (en) | A rule-based detection method for malicious domain names belonging to DGA family | |
| US8260914B1 (en) | Detecting DNS fast-flux anomalies | |
| Singh et al. | Detecting bot-infected machines using DNS fingerprinting | |
| US20140101759A1 (en) | Method and system for detecting malware | |
| EP3913888A1 (en) | Detection method for malicious domain name in domain name system and detection device | |
| WO2017049042A1 (en) | Identifying phishing websites using dom characteristics | |
| CN113810372B (en) | Low-throughput DNS hidden channel detection method and device | |
| CN112929390A (en) | Network intelligent monitoring method based on multi-strategy fusion | |
| CN114091016B (en) | Method, apparatus and computer program product for anomaly detection | |
| US20170308688A1 (en) | Analysis apparatus, analysis system, analysis method, and analysis program | |
| CN109257393A (en) | XSS attack defence method and device based on machine learning | |
| US11916942B2 (en) | Automated identification of false positives in DNS tunneling detectors | |
| CN108234472A (en) | Detection method and device, computer equipment and the readable medium of Challenging black hole attack | |
| CN111835781B (en) | A method and system for discovering a same-origin attack host based on a lost host | |
| CN115001724B (en) | Network threat intelligence management method, device, computing equipment and computer readable storage medium | |
| CN112437062B (en) | ICMP tunnel detection method, device, storage medium and electronic equipment | |
| CN110135162A (en) | The recognition methods of the back door WEBSHELL, device, equipment and storage medium | |
| CN117354024A (en) | DNS malicious domain name detection system and method based on big data | |
| Schiavoni et al. | Tracking and characterizing botnets using automatically generated domains |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| CB02 | Change of applicant information |
Address after: Zhejiang Zhongcai Building No. 68 Binjiang District road Hangzhou City, Zhejiang Province, the 310052 and 15 layer Applicant after: Dbappsecurity Co.,Ltd. Address before: Zhejiang Zhongcai Building No. 68 Binjiang District road Hangzhou City, Zhejiang Province, the 310052 and 15 layer Applicant before: DBAPPSECURITY Co.,Ltd. |
|
| CB02 | Change of applicant information | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant | ||
| EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20180119 Assignee: Hangzhou Anheng Information Security Technology Co.,Ltd. Assignor: Dbappsecurity Co.,Ltd. Contract record no.: X2024980043369 Denomination of invention: Method for detecting infected hosts and C&C servers based on DNS traffic Granted publication date: 20200501 License type: Common License Record date: 20241231 |
|
| EE01 | Entry into force of recordation of patent licensing contract |