ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates.

SEC'13: Proceedings of the 22nd USENIX conference on Security(2013)

引用 32|浏览29
暂无评分
摘要
In this paper, we present ExecScent, a novel system that aims to mine new, previously unknown C&C domain names from live enterprise network traffic. ExecScent automatically learns control protocol templates (CPTs) from examples of known C&C communications. These CPTs are then adapted to the "background traffic" of the network where the templates are to be deployed. The goal is to generate hybrid templates that can self-tune to each specific deployment scenario, thus yielding a better trade-off between true and false positives for a given network environment. To the best of our knowledge, ExecScent is the first system to use this type of adaptive C&C traffic models. We implemented a prototype version of ExecScent, and deployed it in three different large networks for a period of two weeks. During the deployment, we discovered many new, previously unknown C&C domains and hundreds of new infected machines, compared to using a large up-to-date commercial C&C domain blacklist. Furthermore, we deployed the new C&C domains mined by ExecScent to six large ISP networks, discovering more than 25,000 new infected machines.
更多
查看译文
关键词
C domain,unknown C,new infected machine,C communication,C domain name,C traffic model,adaptive C,large up-to-date commercial C,new C,background traffic,adaptive control protocol template,live network
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要