Netinfo Security ›› 2021, Vol. 21 ›› Issue (3): 87-95.doi: 10.3969/j.issn.1671-1122.2021.03.011

Previous Articles     Next Articles

DNS Rebinding Detection Technology Based on Passive DNS Data Analysis

GUO Xuanzhen1,2(), PAN Zulie1,2, SHEN Yi1,2, CHEN Yuanchao1,2   

  1. 1. College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China
    2. Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei 230037, China
  • Received:2020-06-18 Online:2021-03-10 Published:2021-03-16
  • Contact: GUO Xuanzhen E-mail:guoxuanzhen@nudt.edu.cn

Abstract:

DNS rebinding attack based on the domain name system (DNS) can effectively bypass the homologous strategy and firewall, steal sensitive information, and control intranet devices, causing great harm to the Internet community. DNS rebinding can only be realized by setting malicious domain name. Aiming at the detection of malicious domain names related to DNS rebinding, this paper proposes a DNS rebinding classifier (DRC) based on passive DNS data analysis. By introducing passive DNS data, the domain names related to DNS rebinding are characterized from the four measure sets of domain name, time, abnormal communication and malicious behavior. Based on C4.5 decision tree, KNN, SVM and naive Bayes classification methods, the data are classified, trained and weighted. Cross validation experiments show that the accuracy of DRC model for identifying related malicious domain names can reach more than 95%. Compared with the malicious domain name detection tool FluxBuster, DRC model can identify related malicious domain names more accurately.

Key words: DNS rebinding, passive DNS, malware domain name detection, mixed classification

CLC Number: