In this paper, we present MORTON, a method that identifies compromised devices in enterprise networks based on the existence of routine DNS communication between devices and disreputable host names. With its compact representation of the input data and use of efficient signal processing and a neural network for classification, MORTON is designed to be accurate, robust, and scalable. We evaluate MORTON using a large dataset of corporate DNS logs and compare it with two recently proposed beaconing detection methods aimed at detecting malware communication. The results demonstrate that while MORTON's accuracy in a synthetic experiment is comparable to that of the other methods, it outperforms those methods in terms of its ability to detect sophisticated bot communication techniques, such as multistage channels, as well as in its robustness and efficiency. In a real-world evaluation, which includes previously unreported threats, MORTON and the two compared methods were deployed to monitor the (unlabeled) DNS traffic of two global enterprises for a week-long period; this evaluation demonstrates the effectiveness of MORTON in real-world scenarios and showcases its superiority in terms of true and false positive rates.
翻译:在本文中,我们介绍MORTON, 这是一种根据装置之间日常DNS通信和不良主机名称的存在来查明企业网络中受损装置的方法;MORTON以输入数据和使用高效信号处理以及神经网络进行分类为紧凑形式,设计成准确、可靠和可缩放的神经网络;我们使用大量公司DNS日志数据集对MORTON进行评估,并将其与最近提出的两个旨在检测恶意软件通信的灯塔探测方法进行比较;结果显示,虽然MOTON在合成实验中的准确性与其他方法相似,但它在检测尖端机器人通信技术(如多阶段频道)的能力方面,以及其稳健性和效率方面,超过了这些方法;在现实世界评估中,包括以前未报告的威胁,MORTON和两种比较方法被用来在一周内监测两个全球企业的(未贴标签的)DNS流量;这一评估表明,MOTON在现实世界情景中的有效性,并以真实和虚假的积极率展示其优势。