CN105119915A - Malicious domain detection method and device based on intelligence analysis - Google Patents
Malicious domain detection method and device based on intelligence analysis Download PDFInfo
- Publication number
- CN105119915A CN105119915A CN201510502141.8A CN201510502141A CN105119915A CN 105119915 A CN105119915 A CN 105119915A CN 201510502141 A CN201510502141 A CN 201510502141A CN 105119915 A CN105119915 A CN 105119915A
- Authority
- CN
- China
- Prior art keywords
- domain name
- risk level
- analysis
- risk
- weight
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
本发明提供了基于情报分析的恶意域名检测方法及装置。该方法包括:获取网络中的通信数据;对通信数据进行解析,以提取出通信数据中涉及到的源主机的IP、源主机所查询的域名以及查询域名的时间;查询域名风险等级数据库,以确定源主机所查询的域名是否存在于域名风险等级数据库中,如果存在,则从域名风险等级数据库中取出并呈现与域名相对应的风险等级结果,如果不存在,则对域名进行风险等级评估并呈现风险等级评估结果,其中,该风险等级评估包括搜索引擎收录情况分析和互联网档案馆分析。本发明所提供的恶意域名检测方法及装置能够准确检测未知恶意域名。
The invention provides a malicious domain name detection method and device based on intelligence analysis. The method includes: obtaining communication data in the network; analyzing the communication data to extract the IP of the source host involved in the communication data, the domain name queried by the source host, and the time of querying the domain name; querying the domain name risk level database to obtain Determine whether the domain name queried by the source host exists in the domain name risk level database, if it exists, take it out from the domain name risk level database and present the risk level result corresponding to the domain name, if it does not exist, evaluate the risk level of the domain name and A risk level assessment result is presented, wherein the risk level assessment includes analysis of search engine indexing conditions and analysis of Internet archives. The malicious domain name detection method and device provided by the present invention can accurately detect unknown malicious domain names.
Description
技术领域technical field
本发明涉及网络安全技术领域,具体而言涉及一种基于情报分析的恶意域名检测方法及装置。The invention relates to the technical field of network security, in particular to a method and device for detecting a malicious domain name based on intelligence analysis.
背景技术Background technique
随着网络技术的飞速发展和网络时代的到来,网络所蕴含的广阔而丰富的资源,给人类社会带来了很多便利。然而,就在人们的生活越来越依赖网络的同时,由利益驱动而产生的网络安全事件却层出不穷,尤其在近几年,僵尸网络、域名放大分布式拒绝服务攻击、挂马等众多安全事件严重影响了网络的正常使用,也给社会各界带来了极大的危害,因此对这些事件的检测显得额外的重要。With the rapid development of network technology and the arrival of the network age, the vast and rich resources contained in the network have brought a lot of convenience to human society. However, while people's lives are becoming more and more dependent on the Internet, network security incidents driven by interests are emerging one after another. Seriously affected the normal use of the network, but also brought great harm to all sectors of society, so the detection of these events is extra important.
域名系统是当前互联网重要的基础设施之一,大量的网络服务依赖于域名服务来开展。域名解析服务(DNS)将抽象的IP地址映射为易于记忆的域名,使互联网用户更加方便地访问各种网络资源,是互联网体系结构中重要的基础服务之一。由于域名系统并不对依托于其开展的服务行为进行检测,DNS服务缺少恶意行为检测能力,因此常常被恶意程序利用。为了检测这些恶意事件,需要对恶意域名进行检测。The domain name system is one of the important infrastructures of the current Internet, and a large number of network services rely on domain name services to carry out. Domain Name Resolution Service (DNS) maps abstract IP addresses into easy-to-remember domain names, making it easier for Internet users to access various network resources. It is one of the important basic services in the Internet architecture. Because the domain name system does not detect the service behaviors that rely on it, the DNS service lacks the ability to detect malicious behavior, so it is often used by malicious programs. In order to detect these malicious events, malicious domain names need to be detected.
现在已有的一些检测恶意域名的技术常常依赖于黑白名单,通过明确地“允许”和“不允许”来限制用户的访问,从而实现“安全性”效果。然而,这样的方法往往伴随着大量误报和漏报状况,不同用户环境、业务需求场景下适应性极差。Existing technologies for detecting malicious domain names often rely on black and white lists, restricting user access by explicitly "allowing" and "not allowing" to achieve a "safety" effect. However, such methods are often accompanied by a large number of false positives and false negatives, and have poor adaptability to different user environments and business requirements.
发明内容Contents of the invention
针对现有技术的不足,一方面,本发明提供一种基于情报分析的恶意域名检测方法,所述恶意域名检测方法包括:获取网络中的通信数据;对所述通信数据进行解析,以提取出所述通信数据中涉及到的源主机的IP、所述源主机所查询的域名以及查询所述域名的时间;以及查询域名风险等级数据库,以确定所述源主机所查询的域名是否存在于所述域名风险等级数据库中,如果存在,则从所述域名风险等级数据库中取出并呈现与所述域名相对应的风险等级结果,如果不存在,则对所述域名进行风险等级评估并呈现风险等级评估结果,其中,所述风险等级评估包括搜索引擎收录情况分析和互联网档案馆分析,所述搜索引擎收录情况分析和所述互联网档案馆分析分别被分配第一权重和第二权重,所述搜索引擎收录情况分析判定所述域名是否被搜索引擎所收录并分析搜索引擎对所述域名的网页级别评分,并基于分析判定结果和所述第一权重计算所述域名的第一风险分值,所述互联网档案馆分析用于在互联网档案馆中查询并分析所述域名的历史活动记录和/或历史快照并基于分析结果和所述第二权重计算所述域名的第二风险分值,所述风险等级评估结果的计算基于所述第一风险分值和所述第二风险分值。In view of the deficiencies in the prior art, on the one hand, the present invention provides a malicious domain name detection method based on intelligence analysis, the malicious domain name detection method includes: obtaining communication data in the network; analyzing the communication data to extract The IP of the source host involved in the communication data, the domain name queried by the source host, and the time of querying the domain name; and querying the domain name risk level database to determine whether the domain name queried by the source host exists in the In the above-mentioned domain name risk level database, if it exists, take out from the domain name risk level database and present the risk level result corresponding to the domain name, if it does not exist, evaluate the risk level of the domain name and present the risk level Evaluation results, wherein, the risk level evaluation includes the analysis of search engine indexing and Internet Archives, the analysis of search engine indexing and the analysis of Internet Archives are respectively assigned a first weight and a second weight, and the search Engine indexing analysis determines whether the domain name is indexed by the search engine and analyzes the search engine's webpage level score for the domain name, and calculates the first risk score of the domain name based on the analysis and judgment result and the first weight, so The Internet Archives analysis is used to query and analyze the historical activity records and/or historical snapshots of the domain name in the Internet Archives and calculate the second risk score of the domain name based on the analysis results and the second weight, the The calculation of the risk level assessment result is based on the first risk score and the second risk score.
在本发明的一个实施例中,所述风险等级评估还包括域名注册信息关联分析,所述域名注册信息关联分析被分配第三权重,所述域名注册信息关联分析判定所述域名的注册信息的全面性和/或真实性,并基于判定结果和所述第三权重计算所述域名的第三风险分值,并且所述风险等级评估结果的计算还基于所述第三风险分值。In an embodiment of the present invention, the risk level assessment further includes domain name registration information association analysis, the domain name registration information association analysis is assigned a third weight, and the domain name registration information association analysis determines the domain name registration information comprehensiveness and/or authenticity, and calculate a third risk score of the domain name based on the determination result and the third weight, and the calculation of the risk level evaluation result is also based on the third risk score.
在本发明的一个实施例中,所述风险等级评估还包括高频访问名单分析,所述高频访问名单分析被分配第四权重,所述高频访问名单分析判定所述域名当前和在过去的预设时间段内是否均在或者是否均不在所述源主机访问频率最高的前若干位域名名单内,并基于判定结果和所述第四权重计算所述域名的第四风险分值,并且所述风险等级评估结果的计算还基于所述第四风险分值。In one embodiment of the present invention, the risk level assessment further includes high-frequency access list analysis, the high-frequency access list analysis is assigned a fourth weight, and the high-frequency access list analysis determines that the domain name is currently and in the past whether they are all in or not in the list of the top several domain names with the highest access frequency of the source host within the preset time period, and calculate the fourth risk score of the domain name based on the judgment result and the fourth weight, and The calculation of the risk level evaluation result is also based on the fourth risk score.
在本发明的一个实施例中,所述风险等级评估还包括故障监测分析,所述故障监测分析被分配第五权重,所述故障监测分析用于在所述域名的域名服务器发生故障时监测对所述域名服务器发送重新查询请求的主机数目,并基于监测结果和所述第五权重计算所述域名的第五风险分值,并且所述风险等级评估结果的计算还基于所述第五风险分值。In an embodiment of the present invention, the risk level assessment further includes a failure monitoring analysis, the failure monitoring analysis is assigned a fifth weight, and the failure monitoring analysis is used to monitor the failure of the domain name server of the domain name The domain name server sends the host number of the re-query request, and calculates the fifth risk score of the domain name based on the monitoring result and the fifth weight, and the calculation of the risk level evaluation result is also based on the fifth risk score value.
在本发明的一个实施例中,所述风险等级评估还包括异常心跳分析,所述异常心跳分析被分配第六权重,所述异常心跳分析判定所述源主机在单位时间间隔内对所述域名的查询请求是否存在规律性,并基于判定结果和所述第六权重计算所述域名的第六风险分值,并且所述风险等级评估结果的计算还基于所述第六风险分值。In an embodiment of the present invention, the risk level assessment further includes an abnormal heartbeat analysis, the abnormal heartbeat analysis is assigned a sixth weight, and the abnormal heartbeat analysis determines that the source host has a Whether there is regularity in the query request, and calculate the sixth risk score of the domain name based on the judgment result and the sixth weight, and the calculation of the risk level evaluation result is also based on the sixth risk score.
在本发明的一个实施例中,所述风险等级评估还包括子域名语义分析,所述子域名语义分析被分配第七权重,所述子域名语义分析判定所述源主机所查询的域名的子域名是否具有实际意义,并基于判定结果和所述第七权重计算所述域名的第七风险分值,并且所述风险等级评估结果的计算还基于所述第七风险分值。In an embodiment of the present invention, the risk level assessment further includes a subdomain name semantic analysis, the subdomain name semantic analysis is assigned a seventh weight, and the subdomain name semantic analysis determines that the subdomain name of the domain name queried by the source host Whether the domain name has practical significance, and calculate the seventh risk score of the domain name based on the determination result and the seventh weight, and the calculation of the risk level evaluation result is also based on the seventh risk score.
在本发明的一个实施例中,所述恶意域名检测方法还包括:在进行风险等级评估之后,将所述域名以及与所述域名相对应的所述风险等级评估结果录入到所述域名风险等级数据库中。In an embodiment of the present invention, the malicious domain name detection method further includes: after performing risk level assessment, entering the domain name and the risk level assessment result corresponding to the domain name into the domain name risk level in the database.
另一发明,本发明还提供一种基于情报分析的恶意域名检测装置,所述恶意域名检测装置包括:数据获取模块,用于获取网络中的通信数据;数据解析模块,用于对所述通信数据进行解析,以提取出所述通信数据中涉及到的源主机的IP、所述源主机所查询的域名以及查询所述域名的时间;数据查询模块,用于查询域名风险等级数据库,以确定所述源主机所查询的域名是否存在于所述域名风险等级数据库中;域名风险等级评估模块,用于在所述域名风险等级数据库中不存在所述源主机所查询的域名时对所述域名进行风险等级评估;以及评估结果显示模块,用于在所述域名风险等级数据库中存在所述源主机所查询的域名时呈现从所述域名风险等级数据库中提取的与所述域名相对应的风险等级结果,并且在所述域名风险等级数据库中不存在所述源主机所查询的域名时呈现所述域名风险等级评估模块对所述域名的风险等级评估结果,其中,所述域名风险等级评估模块包括:搜索引擎收录情况分析模块,用于判定所述域名是否被搜索引擎所收录并分析搜索引擎对所述域名的网页级别评分,并基于分析判定结果和所分配的第一权重计算所述域名的第一风险分值;以及互联网档案馆分析模块,用于在互联网档案馆中查询并分析所述域名的历史活动记录和/或历史快照并基于分析结果和所分配的第二权重计算所述域名的第二风险分值,其中,所述风险等级评估结果的计算基于所述第一风险分值和所述第二风险分值。Another invention, the present invention also provides a malicious domain name detection device based on intelligence analysis, the malicious domain name detection device includes: a data acquisition module, used to obtain communication data in the network; a data analysis module, used to analyze the communication data The data is analyzed to extract the IP of the source host involved in the communication data, the domain name queried by the source host and the time of querying the domain name; the data query module is used to query the domain name risk level database to determine Whether the domain name queried by the source host exists in the domain name risk level database; the domain name risk level evaluation module is used to evaluate the domain name when the domain name queried by the source host does not exist in the domain name risk level database performing risk level assessment; and an assessment result display module, configured to present the risk corresponding to the domain name extracted from the domain name risk level database when the domain name queried by the source host exists in the domain name risk level database Level results, and when the domain name queried by the source host does not exist in the domain name risk level database, the risk level assessment result of the domain name risk level assessment module for the domain name is presented, wherein the domain name risk level assessment module Including: a search engine inclusion situation analysis module, used to determine whether the domain name is included by the search engine and analyze the webpage level score of the domain name by the search engine, and calculate the domain name based on the analysis and determination results and the assigned first weight and an Internet Archive analysis module, configured to query and analyze historical activity records and/or historical snapshots of the domain name in the Internet Archive and calculate the A second risk score of the domain name, wherein the calculation of the risk level evaluation result is based on the first risk score and the second risk score.
在本发明的一个实施例中,所述域名风险等级评估模块还包括以下模块中的至少一个:域名注册信息关联分析模块,用于判定所述域名的注册信息的全面性和/或真实性,并基于判定结果和所分配的第三权重计算所述域名的第三风险分值;高频访问名单分析模块,用于判定所述域名当前和在过去的预设时间段内是否均在或者是否均不在所述源主机访问频率最高的前若干位域名名单内,并基于判定结果和所分配的第四权重计算所述域名的第四风险分值;故障监测分析模块,用于在所述域名的域名服务器发生故障时监测对所述域名服务器发送重新查询请求的主机数目,并基于监测结果和所分配的第五权重计算所述域名的第五风险分值;异常心跳分析模块,用于判定所述源主机在单位时间间隔内对所述域名的查询请求是否存在规律性,并基于判定结果和所分配的第六权重计算所述域名的第六风险分值;以及子域名语义分析模块,用于判定所述源主机所查询的域名的子域名是否具有实际意义,并基于判定结果和所分配的第七权重计算所述域名的第七风险分值,其中,所述风险等级评估结果的计算还基于以下中的至少一个:所述第三风险分值、所述第四风险分值、所述第五风险分值、所述第六风险分值以及所述第七风险分值。In an embodiment of the present invention, the domain name risk level assessment module further includes at least one of the following modules: a domain name registration information correlation analysis module, configured to determine the comprehensiveness and/or authenticity of the registration information of the domain name, And calculate the third risk score of the domain name based on the judgment result and the assigned third weight; the high-frequency access list analysis module is used to determine whether the domain name is currently and in the past preset time period or whether are not in the list of the top several domain names with the highest access frequency of the source host, and calculate the fourth risk score of the domain name based on the judgment result and the assigned fourth weight; the fault monitoring and analysis module is used to When the domain name server fails, monitor the number of hosts that send re-query requests to the domain name server, and calculate the fifth risk score of the domain name based on the monitoring results and the assigned fifth weight; the abnormal heartbeat analysis module is used to determine Whether there is regularity in the query request of the domain name by the source host within a unit time interval, and calculating the sixth risk score of the domain name based on the judgment result and the assigned sixth weight; and a subdomain name semantic analysis module, used to determine whether the subdomain name of the domain name queried by the source host has practical significance, and calculate the seventh risk score of the domain name based on the determination result and the assigned seventh weight, wherein the risk level evaluation result of the The calculation is also based on at least one of: the third risk score, the fourth risk score, the fifth risk score, the sixth risk score, and the seventh risk score.
在本发明的一个实施例中,所述域名风险等级评估模块还用于将进行了风险等级评估的域名以及与所述域名相对应的风险等级评估结果录入到所述域名风险等级数据库中。In an embodiment of the present invention, the domain name risk level assessment module is further configured to input the domain name with risk level assessment and the risk level assessment result corresponding to the domain name into the domain name risk level database.
本发明所提供的基于情报分析的恶意域名检测方法及装置不依赖黑白名单,能够准确检测未知恶意域名。The malicious domain name detection method and device based on intelligence analysis provided by the present invention do not rely on black and white lists, and can accurately detect unknown malicious domain names.
附图说明Description of drawings
本发明的下列附图在此作为本发明的一部分用于理解本发明。附图中示出了本发明的实施例及其描述,用来解释本发明的原理。The following drawings of the invention are hereby included as part of the invention for understanding the invention. The accompanying drawings illustrate embodiments of the invention and description thereof to explain principles of the invention.
附图中:In the attached picture:
图1示出了根据本发明实施例的基于情报分析的恶意域名检测方法的流程图;FIG. 1 shows a flow chart of a method for detecting a malicious domain name based on intelligence analysis according to an embodiment of the present invention;
图2示出了根据本发明实施例的异常心跳分析的流程图;以及Fig. 2 shows a flow chart of abnormal heartbeat analysis according to an embodiment of the present invention; and
图3示出了根据本发明实施例的域名风险等级评估模块的架构图。Fig. 3 shows a structure diagram of a domain name risk level assessment module according to an embodiment of the present invention.
具体实施方式Detailed ways
在下文的描述中,给出了大量具体的细节以便提供对本发明更为彻底的理解。然而,对于本领域技术人员而言显而易见的是,本发明可以无需一个或多个这些细节而得以实施。在其他的例子中,为了避免与本发明发生混淆,对于本领域公知的一些技术特征未进行描述。In the following description, numerous specific details are given in order to provide a more thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without one or more of these details. In other examples, some technical features known in the art are not described in order to avoid confusion with the present invention.
应当理解的是,本发明能够以不同形式实施,而不应当解释为局限于这里提出的实施例。相反地,提供这些实施例将使公开彻底和完全,并且将本发明的范围完全地传递给本领域技术人员。It should be understood that the invention can be embodied in different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
在此使用的术语的目的仅在于描述具体实施例并且不作为本发明的限制。在此使用时,单数形式的“一”、“一个”和“所述/该”也意图包括复数形式,除非上下文清楚指出另外的方式。还应明白术语“组成”和/或“包括”,当在该说明书中使用时,确定所述特征、整数、步骤、操作、元件和/或部件的存在,但不排除一个或更多其它的特征、整数、步骤、操作、元件、部件和/或组的存在或添加。在此使用时,术语“和/或”包括相关所列项目的任何及所有组合。The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms "a", "an" and "the/the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the terms "consists of" and/or "comprising", when used in this specification, identify the presence of stated features, integers, steps, operations, elements and/or parts, but do not exclude one or more other Presence or addition of features, integers, steps, operations, elements, parts and/or groups. As used herein, the term "and/or" includes any and all combinations of the associated listed items.
为了彻底理解本发明,将在下列的描述中提出详细的步骤以及详细的结构,以便阐释本发明的技术方案。本发明的较佳实施例详细描述如下,然而除了这些详细描述外,本发明还可以具有其他实施方式。In order to thoroughly understand the present invention, detailed steps and detailed structures will be provided in the following description, so as to illustrate the technical solution of the present invention. Preferred embodiments of the present invention are described in detail below, however, the present invention may have other embodiments besides these detailed descriptions.
本发明的一个实施例提供一种基于情报分析的恶意域名检测方法。下面,参照图1来具体描述根据本发明一个实施例的恶意域名检测方法。图1示出了根据本发明实施例的基于情报分析的恶意域名检测方法的流程图。如图1所示,基于情报分析的恶意域名检测方法的流程如下:An embodiment of the present invention provides a malicious domain name detection method based on intelligence analysis. In the following, a method for detecting a malicious domain name according to an embodiment of the present invention will be specifically described with reference to FIG. 1 . Fig. 1 shows a flowchart of a method for detecting a malicious domain name based on intelligence analysis according to an embodiment of the present invention. As shown in Figure 1, the flow of the malicious domain name detection method based on intelligence analysis is as follows:
首先进行数据获取,即获取网络中的通信数据。示例性地,可以通过DNS服务器的查询日志或嗅探器(sinffer)抓取到的数据流量等方式获取待监控的网络中的通信数据。Firstly, data acquisition is performed, that is, communication data in the network is acquired. Exemplarily, the communication data in the network to be monitored can be obtained through query logs of the DNS server or data traffic captured by a sniffer (sinffer).
在获取数据后,对所获取的数据进行解析,以提取出通信数据中涉及到的源主机的IP、源主机所查询的域名以及查询域名的时间。通过数据解析所提取的内容可以用域名查询结构A来表示,并采用该结构作为查询的基础数据结构。其中,域名查询结构A可以为如表1所示的包括下列表项的结构:After the data is acquired, the acquired data is analyzed to extract the IP of the source host involved in the communication data, the domain name queried by the source host, and the time of querying the domain name. The content extracted through data parsing can be represented by the domain name query structure A, and this structure is used as the basic data structure of the query. Wherein, the domain name query structure A may be a structure including the following table items as shown in Table 1:
表1Table 1
对数据进行解析后,进行数据查询,即查询域名风险等级数据库,以确定源主机所查询的域名是否存在于域名风险等级数据库中。其中,域名风险等级数据库可以包括已发生的攻击事件的恶意域名及其相对应的风险等级。示例性地,域名风险等级数据库的存储结构可以如表2所示:After analyzing the data, perform data query, that is, query the domain name risk level database to determine whether the domain name queried by the source host exists in the domain name risk level database. Wherein, the domain name risk level database may include malicious domain names of attack events that have occurred and their corresponding risk levels. Exemplarily, the storage structure of the domain name risk level database may be as shown in Table 2:
表2Table 2
其中,域名风险等级分数可以不断更新,初始域名风险等级分数是初始录用时的分数,随着更新次数的增加,可以采用对多次分数加权积分的手段计算最终风险等级分数。初始录用时间是指域名初始录入到域名风险等级数据库的时间。最近更新时间是指域名对应的域名风险等级分数最近更新的时间。更新周期是指录入到域名风险等级数据库中的域名更新的周期,到达更新周期,将自动更新域名风险等级分数和域名风险等级。变更记录记录域名初始录入和每次更新的时间点和域名风险等级分数,用于对域名风险等级分数做加权的积分,确定最终域名风险等级分数,加权是指时间越近所占权值越大,时间越久远所占权值越小。域名活跃度记录监控网络内域名的活跃度,根据统计域名查询数据判定单位时间内的查询次数,查询次数多,域名活跃度高,域名活跃度可以影响域名的更新周期,也就是说对于活跃度低的域名,其更新周期可以相应的长一些。Among them, the domain name risk level score can be continuously updated. The initial domain name risk level score is the score at the time of initial recruitment. As the number of updates increases, the final risk level score can be calculated by weighting multiple scores. The initial recruitment time refers to the time when the domain name is initially entered into the domain name risk level database. The latest update time refers to the latest update time of the domain name risk rating score corresponding to the domain name. The update period refers to the update period of the domain name entered into the domain name risk level database. When the update period is reached, the domain name risk level score and domain name risk level will be automatically updated. The change record records the time point of initial domain name entry and each update and the domain name risk level score, which is used to weight the domain name risk level score to determine the final domain name risk level score. Weighting means that the closer the time is, the greater the weight value , the longer the time, the smaller the weight. Domain name activity records monitor the activity of domain names in the network, and determine the number of queries per unit time based on statistical domain name query data. If there are more queries, domain name activity is high, and domain name activity can affect the update cycle of domain names, that is to say, for activity Low domain name, its update cycle can be correspondingly longer.
通过查询域名风险等级数据库,可以确定源主机所查询的域名是否存在于所述域名风险等级数据库中,如果存在,则从域名风险等级数据库中取出并呈现与所查询的域名相对应的风险等级结果。反之,如果域名风险等级数据库中没有源主机所查询的域名,则对该域名进行风险等级评估,随后呈现风险等级评估结果。By querying the domain name risk level database, it can be determined whether the domain name queried by the source host exists in the domain name risk level database, and if so, the risk level result corresponding to the queried domain name is retrieved from the domain name risk level database and presented . Conversely, if the domain name queried by the source host does not exist in the domain name risk level database, the risk level assessment is performed on the domain name, and then the risk level assessment result is presented.
优选地,可以将风险等级评估后的结果录入到域名风险等级数据库中,以进一步地更新域名风险等级数据库,从而使得根据本发明实施例的上述基于情报分析的恶意域名检测方法不基于已有黑白名单限制访问,而是通过系统评估动态生成能够用来准确判断域名恶意性的域名风险等级数据库。Preferably, the risk level assessment results can be entered into the domain name risk level database to further update the domain name risk level database, so that the above-mentioned malicious domain name detection method based on intelligence analysis according to the embodiment of the present invention is not based on existing black and white The list restricts access, but dynamically generates a domain name risk level database that can be used to accurately judge the maliciousness of domain names through system evaluation.
其中,域名风险等级评估可以包括异常心跳分析。异常心跳分析通过判定源主机在单位时间间隔内对域名的查询请求是否存在规律性来确定域名的风险等级。由对已发生的APT攻击事件的研究发现,APT攻击为保持连接,通常会定时发送心跳包,保证存活,这是正常应用程序没有的机制。我们可以设置一个统计时间段,在每个统计时间段内统计域名查询请求,正常应用程序或网页浏览的域名查询应该是随机的无规律,若出现周期性的有规律的域名查询则说明可能存在异常。此时可以确定域名的风险等级为高。或者,示例性地,当域名风险等级评估还包括其他分析时,可以基于对异常心跳分析所分配的权重对域名的风险等级增加相应的分值,上述流程正如图2所示的。Wherein, domain name risk level assessment may include abnormal heartbeat analysis. Abnormal heartbeat analysis determines the risk level of the domain name by determining whether there is regularity in the source host's query requests for the domain name within a unit time interval. According to the research on the APT attacks that have occurred, in order to maintain the connection, APT attacks usually send heartbeat packets regularly to ensure survival. This is a mechanism that normal applications do not have. We can set a statistical time period to count domain name query requests in each statistical time period. The domain name queries of normal applications or web browsing should be random and irregular. If there are periodic and regular domain name queries, it means that there may be abnormal. At this time, it can be determined that the risk level of the domain name is high. Or, for example, when the domain name risk level assessment includes other analysis, a corresponding score may be added to the risk level of the domain name based on the weight assigned to the abnormal heartbeat analysis, as shown in FIG. 2 .
根据本发明实施例的域名风险等级评估还可以包括子域名语义分析。子域名语义分析通过判定源主机所查询的域名的子域名是否具有实际意义来确定域名的风险等级。示例性地,子域名语义分析可以包括一二级域名含义分析,例如可以探查查询域名的一二级域名是否具有实际意义,如单词,拼音,单个字母等相应含义。正常域名的顶级域名和一二级域名都是有实际含义的,顶级域名分为两类:一是国家顶级域名,200多个国家都按照ISO3166国家代码分配了顶级域名,例如中国是cn,美国是us,日本是jp等;二是国际顶级域名,例如表示工商企业的.com,表示网络提供商的.net,表示非盈利组织的.org等。一级域名,在国际顶级域名下,指域名注册人的网上名称,例如ibm、yahoo、microsoft等;在国家顶级域名下,表示注册企业类别的符号,例如com、edu、gov、net等。若查询域名的顶级域名既不是按照ISO3166国家代码分配的顶级域名,又不是国际顶级域名,一级域名又不是知名的注册人网上名称,无实际含义(相应单词,拼音,字母含义等),则可以将其视为恶意域名,或者,示例性地,当域名风险等级评估还包括其他分析时,可以基于对子域名语义分析所分配的权重对域名的风险等级计入相应的风险分值。The domain name risk level assessment according to the embodiment of the present invention may also include subdomain name semantic analysis. The subdomain semantic analysis determines the risk level of the domain name by determining whether the subdomain name of the domain name queried by the source host has practical significance. Exemplarily, the semantic analysis of the sub-domain name may include meaning analysis of the first-level and second-level domain names, for example, it may be checked whether the first-level and second-level domain names of the query domain name have actual meanings, such as words, pinyin, single letters and other corresponding meanings. The top-level domain names and first- and second-level domain names of normal domain names have practical meanings. Top-level domain names are divided into two categories: one is the national top-level domain name, and more than 200 countries have allocated top-level domain names according to the ISO3166 country code. It is us, Japan is jp, etc.; the second is the international top-level domain name, such as .com for industrial and commercial enterprises, .net for network providers, .org for non-profit organizations, etc. The first-level domain name refers to the online name of the domain name registrant under the international top-level domain name, such as ibm, yahoo, microsoft, etc.; under the national top-level domain name, it refers to the symbol of the registered enterprise category, such as com, edu, gov, net, etc. If the top-level domain name of the query domain name is neither a top-level domain name assigned according to the ISO3166 country code, nor an international top-level domain name, and the first-level domain name is not the online name of a well-known registrant, and has no actual meaning (corresponding words, pinyin, letter meaning, etc.), then It can be regarded as a malicious domain name, or, for example, when the domain name risk level assessment includes other analysis, the risk level of the domain name can be included in the corresponding risk score based on the weight assigned to the semantic analysis of the subdomain name.
根据本发明的一个实施例,域名风险等级评估还可以包括域名注册信息关联分析。域名注册信息关联分析通过判定域名的注册信息的全面性和/或真实性来确定域名的风险等级。可以探查域名的注册信息,采用Whois查询该域名的注册信息填写域名注册结构B。示例性地,域名注册结构B可以如下表3所示:According to an embodiment of the present invention, domain name risk level assessment may also include association analysis of domain name registration information. The domain name registration information association analysis determines the risk level of the domain name by judging the comprehensiveness and/or authenticity of the registration information of the domain name. You can check the registration information of the domain name, use Whois to query the registration information of the domain name and fill in the domain name registration structure B. Exemplarily, domain name registration structure B may be shown in Table 3 below:
表3table 3
可以对注册结构B中的各表项进行关联分析,注册信息越全面真实,域名注册时间较长,注册名和注册邮箱通过关联分析无任何恶意行为记录则认为该项条件检测安全,并且不计入相应的风险分值,即风险分值为0分;若注册信息不完全,域名注册时间较短,或该域名为某一时间段内大规模注册的相似性域名,注册名或注册邮箱通过关联分析发现同时是某些恶意域名的注册名或注册邮箱,则认为域名的风险等级较高,从而根据预设权重计入相应的风险分值。Correlation analysis can be performed on each table item in the registration structure B. The more comprehensive and authentic the registration information is, the longer the domain name registration time is, and the registered name and registered email address have no malicious behavior records through correlation analysis, the condition is considered safe and will not be counted. The corresponding risk score, that is, the risk score is 0 points; if the registration information is incomplete, the domain name registration time is short, or the domain name is a similar domain name registered on a large scale within a certain period of time, the registered name or registered email address can be linked If the analysis finds that it is also the registered name or registered email address of some malicious domain names, the domain name is considered to have a higher risk level, and the corresponding risk score is calculated according to the preset weight.
根据本发明的一个实施例,域名风险等级评估还可以包括高频访问名单分析。高频访问名单分析通过判定域名当前以及在过去的预设时间段内是否均在或者是否均不在源主机访问频率最高的前若干位域名名单内来确定域名的风险等级。示例性地,可以划分时间段,周期性地统计各主机常用域名前若干位。例如,可以根据统计学规律和各个主机上网的规律,周期性地统计各主机常用域名前若干位,例如Top10。一般情况下,Top10的名单基本不会改变,说明上网情况稳定。例如,域名当前以及在过去的预设时间段内均在Top10单名内,或者域名当前以及在过去的预设时间段内均不在Top10单名内,则可认为该域名是非恶意的,因此可以不计入相应的风险分值,即风险分值为0分。反之,若Top10的名单发生了较大的改变,例如过去不曾出现在Top10名单中的域名出现在了Top10名单中,则认为该时间段内主机的“行为”较平时出现了异常,该变动域名则很有可能为恶意域名。示例性地,当域名风险等级评估还包括其他分析时,可以基于对高频访问名单分析所分配的权重对域名的风险等级计入相应的风险分值。According to an embodiment of the present invention, domain name risk level assessment may also include frequent access list analysis. The high-frequency access list analysis determines the risk level of the domain name by judging whether the domain name is currently in or not in the list of the top several domain names with the highest frequency of source host visits within the preset time period in the past. Exemplarily, time periods may be divided, and the first several digits of the commonly used domain names of each host are counted periodically. For example, according to statistical laws and the Internet access rules of each host, the first few digits of the common domain names of each host can be counted periodically, such as Top10. Under normal circumstances, the Top10 list will basically not change, indicating that the Internet access is stable. For example, if the domain name is currently in the Top 10 list and in the past preset time period, or the domain name is not in the Top 10 list in the past preset time period, it can be considered that the domain name is not malicious, so it can be Not included in the corresponding risk score, that is, the risk score is 0 points. Conversely, if the Top 10 list has undergone major changes, for example, a domain name that has never appeared in the Top 10 list in the past appears in the Top 10 list, it is considered that the "behavior" of the host during this period is abnormal compared with usual, and the changed domain name Then it is likely to be a malicious domain name. Exemplarily, when the risk level assessment of the domain name includes other analysis, the risk level of the domain name may be included in the corresponding risk score based on the weight assigned to the analysis of the high-frequency access list.
根据本发明的一个实施例,域名风险等级评估还可以包括故障监测分析。故障监测分析通过在域名的域名服务器发生故障时监测对域名服务器发送重新查询请求的主机数目来确定域名的风险等级。当域名服务器出现响应故障时,监控网段中大部分主机都应该重新发送查询请求,若此时只有单一固定的几台主机定时发送该域名的查询请求,则该域名为恶意域名的可能性较大,因为正常域名在日常情况中是被广泛访问的,若其出现故障,重新访问该域名的用户占比较高,但若是攻击端的恶意域名其只与监控网络中的一台或几台被控主机有通讯需求,故其产生的重新请求查询量是相对较少的,或具有来源单一性的,那么我们认为该查询域名可能为恶意域名。示例性地,当域名风险等级评估还包括其他分析时,可以基于对故障监测分析所分配的权重对域名的风险等级计入相应的风险分值。According to an embodiment of the present invention, domain name risk level assessment may also include fault monitoring and analysis. Failure monitoring analysis determines the risk level of a domain name by monitoring the number of hosts that send re-query requests to the domain name server when the domain name server of the domain name fails. When the domain name server fails to respond, most of the hosts in the monitoring network segment should resend the query request. If only a few fixed hosts send the query request of the domain name regularly at this time, the possibility of the domain name being a malicious domain name is relatively high. Because normal domain names are widely accessed in daily situations, if it fails, the proportion of users revisiting the domain name is relatively high, but if it is a malicious domain name on the attack side, it is only related to one or a few computers in the monitoring network. The host has communication needs, so the amount of re-request queries generated by it is relatively small, or has a single source, then we think that the query domain name may be a malicious domain name. Exemplarily, when the assessment of the risk level of the domain name includes other analysis, the risk level of the domain name may be included in a corresponding risk score based on the weight assigned to the fault monitoring analysis.
根据本发明的一个实施例,域名风险等级评估还可以包括搜索引擎收录情况分析。搜索引擎收录情况分析通过判定域名是否被搜索引擎所收录和/或参照搜索引擎对域名的网页级别评分来确定域名的风险等级。搜索引擎通常对当前活动的域名有收录功能,也就是说所有当前活动的页面都是可以被搜索引擎爬取到的,而对于那些零收录的域名,也就是不能被搜索引擎爬取到的域名,则认为其为恶意域名的可能性较大。另外,同时也可以将GooglePR、搜狗PR的评分列为参考对象。PR为PageRank也就是网页级别,其评分级别为从0到10,10级为满分。PR值越高说明该网页越受欢迎(越重要)。例如:一个PR值为1的网站表明这个网站不太具有流行度,而PR值为7到10则表明这个网站非常受欢迎(或者说极其重要)。一般PR值达到4,就算是一个不错的网站了。若一个域名越受欢迎,那么其为恶意域名的可能性就越低;反之,评分较低特别是0分的域名,其为恶意域名的可能性很高。示例性地,当域名风险等级评估还包括其他分析时,可以基于对搜索引擎收录情况分析所分配的权重对域名的风险等级计入相应的风险分值。According to an embodiment of the present invention, the assessment of the risk level of the domain name may also include the analysis of the indexing conditions of search engines. The analysis of search engine indexing determines the risk level of the domain name by determining whether the domain name is indexed by the search engine and/or referring to the webpage rating score of the domain name by the search engine. Search engines usually have a collection function for currently active domain names, that is to say, all currently active pages can be crawled by search engines, and for those domain names with zero collection, that is, domain names that cannot be crawled by search engines , it is considered that it is more likely to be a malicious domain name. In addition, the scores of Google PR and Sogou PR can also be listed as reference objects at the same time. PR is PageRank, that is, the level of the web page, and its scoring level is from 0 to 10, with 10 being the full score. The higher the PR value, the more popular (and more important) the webpage is. For example: a website with a PR value of 1 indicates that the website is not very popular, while a PR value of 7 to 10 indicates that the website is very popular (or extremely important). Generally, if the PR value reaches 4, it is considered a good website. The more popular a domain name is, the less likely it is a malicious domain name; on the contrary, the domain name with a lower score, especially 0 points, has a higher possibility of being a malicious domain name. Exemplarily, when the domain name risk level assessment includes other analysis, the risk level of the domain name may be included in the corresponding risk score based on the weight assigned to the analysis of the search engine indexing situation.
根据本发明的一个实施例,域名风险等级评估还可以包括互联网档案馆分析。互联网档案馆分析通过在互联网档案馆中查询并分析域名的历史活动记录和/或历史快照来确定域名的风险等级。相比较于搜索引擎的检索记录查询,互联网档案馆archive.org查询的优势在于:已下线网站搜索引擎会排除搜索结果记录,但互联网档案馆是整个互联网历史的大百科全书。也就是说对于那些已下线网站,目前搜索引擎已经不再收录,但archive.org还能检索到历史snapshot。因此可以根据对其活动时间,活动行为,历史snapshot的分析判定其是否有恶意域名的嫌疑,比如一个域名活动一段时间,销声匿迹之后,又发生大规模的活动,那么可以认为它是可疑的。示例性地,当域名风险等级评估还包括其他分析时,可以基于对互联网档案馆分析所分配的权重对域名的风险等级计入相应的风险分值。According to an embodiment of the present invention, domain name risk level assessment may also include Internet Archives analysis. Internet Archive analysis determines the risk level of a domain name by querying and analyzing the domain name's historical activity records and/or historical snapshots in the Internet Archive. Compared with the retrieval record query of search engines, the Internet Archive archive.org query has the advantage that the search engine of offline websites will exclude the search result records, but the Internet Archive is a large encyclopedia of the entire Internet history. That is to say, for those offline websites, search engines no longer include them, but archive.org can still retrieve historical snapshots. Therefore, based on the analysis of its activity time, activity behavior, and historical snapshots, it can be determined whether it is suspected of being a malicious domain name. For example, if a domain name has been active for a period of time, and after it disappears, large-scale activities occur again, then it can be considered suspicious. Exemplarily, when the assessment of the risk level of the domain name includes other analysis, the risk level of the domain name may be included in the corresponding risk score based on the weight assigned to the analysis of the Internet Archive.
根据上述实施例,域名风险等级评估可以包括异常心跳分析、子域名语义分析、域名注册信息关联分析、高频访问名单分析、故障监测分析、搜索引擎收录情况分析以及互联网档案馆分析中的任意一个或它们的任意组合。当组合分析时,可以为它们分配相应的权重,使其各自的分析按照所分配的权重计算相应的风险分值,最终总体的风险等级评估结果即为它们各自计算的风险分值的总和。其中,对各分析所分配的权重可以依据实际情况而改变,从而可以实现定制化域名风险等级评估。According to the above-mentioned embodiment, domain name risk level assessment may include any one of abnormal heartbeat analysis, subdomain semantic analysis, domain name registration information association analysis, high-frequency access list analysis, fault monitoring analysis, search engine indexing analysis, and Internet Archive analysis or any combination of them. When combined analysis, they can be assigned corresponding weights, so that their respective analyzes can calculate corresponding risk scores according to the assigned weights, and the final overall risk level evaluation result is the sum of their respective calculated risk scores. Among them, the weight assigned to each analysis can be changed according to the actual situation, so as to realize the customized domain name risk level assessment.
最终的风险等级评估结果可以包括风险分值及其相对应的风险等级。例如,可以设定在某一风险分值范围内为高风险等级,在另一风险分值范围内为可疑风险等级,而在另一风险分值范围内为低风险等级。可以根据域名风险等级设置警报机制,例如,监控网络内主机访问高风险域名系统发出高危警报;监控网络内主机访问可疑风险域名系统发出低危警报;监控网络内主机访问低风险域名不触发警报。若发现监控网络中的主机频繁查询可疑风险域名,则需要加强警惕;若监控网络中的主机频繁查询高风险域名,则可以认为其遭受了APT攻击。The final risk level evaluation result may include a risk score and its corresponding risk level. For example, it may be set as a high risk level within a certain risk score range, a suspicious risk level within another risk score range, and a low risk level within another risk score range. The alarm mechanism can be set according to the risk level of the domain name. For example, the high-risk domain name system that monitors hosts in the network to access high-risk domain names sends out high-risk alarms; the system that monitors hosts in the network that access suspicious-risk domain names sends out low-risk alarms; If it is found that the hosts in the monitoring network frequently query suspicious risk domain names, you need to strengthen your vigilance; if the hosts in the monitoring network frequently query high-risk domain names, it can be considered that they have suffered APT attacks.
下面通过示例来描述上述风险评估过程。在一个示例中,域名风险等级评估包括异常心跳分析、子域名语义分析和域名注册信息关联分析。其中,例如,异常心跳分析被分配40%的权重,子域名语义分析和域名注册信息关联分析分别被分配30%的权重。如果已经确定是恶意域名的风险分值为100分,那么,如果异常心跳分析判定源主机在单位时间间隔内对域名的查询请求存在规律性,则可以计算域名的第I风险分值为40%*100=40分;如果子域名语义分析判定源主机所查询的域名的子域名具有实际意义,则该项分析不计入风险分值,即第II风险分值为0分;类似地,如果域名注册信息关联分析判定域名的注册信息的不全面或不真实等,则可以计算域名的第III风险分值为30%*100=30分。这样,域名风险等级评估的总体风险分值为40+0+30=70分。如果定义域名风险等级分值在(80,100]范围内是高风险域名、(40,80]范围内是可疑风险域名、在[0,40]范围内是低风险域名,则该域名的风险等级为可疑风险域名,其例如可以触发低危警报,以提示需要加强警惕。本领域普通技术人员可以理解,上述描述仅为一个示例,域名风险等级评估所包括的分析、每种分析所分配的权重、风险分值与风险等级的对应关系等都可以根据不同情况而改变,以适应不同业务不同环境的需求。The above risk assessment process is described below with an example. In one example, domain name risk level assessment includes abnormal heartbeat analysis, subdomain semantic analysis and domain name registration information association analysis. Among them, for example, abnormal heartbeat analysis is assigned a weight of 40%, and subdomain semantic analysis and domain name registration information association analysis are assigned a weight of 30%. If it has been determined that the risk score of a malicious domain name is 100 points, then, if the abnormal heartbeat analysis determines that there is regularity in the query request of the domain name by the source host within a unit time interval, the first risk score of the domain name can be calculated as 40%. *100=40 points; if the subdomain name semantic analysis determines that the subdomain name of the domain name queried by the source host has practical significance, then this analysis will not be included in the risk score, that is, the second risk score is 0 points; similarly, if Domain name registration information association analysis determines that the registration information of the domain name is incomplete or untrue, etc., then the third risk score of the domain name can be calculated as 30%*100=30 points. In this way, the overall risk score of domain name risk level evaluation is 40+0+30=70 points. If the domain name risk grade score is defined as a high-risk domain name in the range of (80, 100), a suspicious risk domain name in the range of (40, 80], and a low-risk domain name in the range of [0, 40], then the risk of the domain name The level is a suspicious risk domain name, which can, for example, trigger a low-risk alert to prompt that vigilance needs to be strengthened. Those of ordinary skill in the art can understand that the above description is only an example, the analysis included in the domain name risk level assessment, and the assigned The corresponding relationship between weight, risk score and risk level, etc. can be changed according to different situations, so as to adapt to the needs of different businesses and different environments.
根据本发明实施例的上述基于情报分析的恶意域名检测方法对恶意域名的判定不依赖黑白名单。虽然黑白名单的机制因为它的“简单粗暴”而被广泛的应用,然而,通过明确的允许和不允许来限制用户的访问往往伴随着大量误报和漏报状况,不同用户环境、业务需求场景下适应性极差。根据本发明实施例的上述基于情报分析的恶意域名检测方法不是基于已有黑白名单限制访问,而是通过系统评估动态生成域名风险等级数据库,既可以提醒用户访问域名的风险等级,也可以依据具体用户情况设定响应联动策略阻止对高风险域名的访问。The malicious domain name detection method based on intelligence analysis according to the embodiment of the present invention does not rely on black and white lists for determining malicious domain names. Although the black and white list mechanism is widely used because of its "simple and rude", however, restricting user access through explicit permission and disallowance is often accompanied by a large number of false positives and false positives. Different user environments and business demand scenarios Very poor adaptability. The above-mentioned malicious domain name detection method based on intelligence analysis according to the embodiment of the present invention does not restrict access based on the existing black and white lists, but dynamically generates a domain name risk level database through system evaluation, which can not only remind users of the risk level of accessing domain names, but also based on specific The user situation sets the response linkage policy to block access to high-risk domain names.
此外,根据本发明实施例的上述基于情报分析的恶意域名检测方法可发现未知恶意域名。该方法使得未知域名通过域名风险等级评估系统综合评估后,可以得到一个风险等级分数(例如百分制的分数),该分数的大小标志着该未知域名的风险等级情况,通过专家知识设定的风险评级标准可以发现新恶意域名。In addition, the above malicious domain name detection method based on intelligence analysis according to the embodiment of the present invention can discover unknown malicious domain names. This method allows the unknown domain name to obtain a risk level score (such as a score of 100 points) after comprehensive evaluation by the domain name risk level evaluation system. The size of the score indicates the risk level of the unknown domain name. Criteria can spot new malicious domains.
进一步地,根据本发明实施例的上述基于情报分析的恶意域名检测方法可以融合多纬度评价体系评估恶意域名风险等级,减少了依据单一条件判断域名为恶意域名的误报率。采用多种判断源设定不同作用权值实现对域名恶意性的判断,一方面可以减少单一判断源的偶然性和误报情况,另一方面也增强了域名风险等级评估系统的自适应性,可根据不同环境要求,动态更改恶意域名判断源的权值,从而实现定制化域名风险等级评估。Furthermore, the above-mentioned malicious domain name detection method based on intelligence analysis according to the embodiment of the present invention can integrate a multi-dimensional evaluation system to evaluate the risk level of malicious domain names, reducing the false positive rate of judging domain names as malicious domain names based on a single condition. Using multiple judgment sources to set different action weights to realize the judgment of domain name maliciousness, on the one hand, it can reduce the accidental and false positives of a single judgment source, and on the other hand, it also enhances the adaptability of the domain name risk level assessment system, which can According to different environmental requirements, dynamically change the weight of malicious domain name judgment source, so as to realize customized domain name risk level assessment.
根据本发明的另一方面,还提供一种基于情报分析的恶意域名检测装置,该恶意域名检测装置包括:数据获取模块,用于获取网络中的通信数据;数据解析模块,用于对通信数据进行解析,以提取出通信数据中涉及到的源主机的IP、源主机所查询的域名以及查询域名的时间;数据查询模块,用于查询域名风险等级数据库,以确定源主机所查询的域名是否存在于域名风险等级数据库中;域名风险等级评估模块,用于在域名风险等级数据库中不存在源主机所查询的域名时对域名进行风险等级评估;以及评估结果显示模块,用于在域名风险等级数据库中存在源主机所查询的域名时呈现从域名风险等级数据库中提取的与域名相对应的风险等级结果,并且在域名风险等级数据库中不存在源主机所查询的域名时呈现域名风险等级评估模块对域名的风险等级评估结果。According to another aspect of the present invention, a malicious domain name detection device based on intelligence analysis is also provided, the malicious domain name detection device includes: a data acquisition module, used to obtain communication data in the network; a data analysis module, used to analyze the communication data Analyze to extract the IP of the source host involved in the communication data, the domain name queried by the source host and the time of querying the domain name; the data query module is used to query the domain name risk level database to determine whether the domain name queried by the source host is It exists in the domain name risk level database; the domain name risk level assessment module is used to evaluate the risk level of the domain name when the domain name queried by the source host does not exist in the domain name risk level database; and the assessment result display module is used to check the domain name risk level When the domain name queried by the source host exists in the database, the risk level result corresponding to the domain name extracted from the domain name risk level database is presented, and the domain name risk level evaluation module is displayed when the domain name queried by the source host does not exist in the domain name risk level database The result of the risk level assessment of the domain name.
其中,域名风险等级评估模块可以包括如图3所示的如下模块中的至少一个或其任意组合:Among them, the domain name risk level assessment module may include at least one of the following modules as shown in Figure 3 or any combination thereof:
搜索引擎收录情况分析模块,用于判定域名是否被搜索引擎所收录并分析搜索引擎对域名的网页级别评分,并基于分析判定结果和所分配的第一权重计算域名的第一风险分值。The search engine inclusion status analysis module is used to determine whether the domain name is included by the search engine and analyze the webpage level score of the domain name by the search engine, and calculate the first risk score of the domain name based on the analysis and determination results and the assigned first weight.
互联网档案馆分析模块,用于在互联网档案馆中分析域名的历史活动记录和/或历史快照,并基于分析结果和所分配的第二权重计算域名的第二风险分值。The Internet Archive analysis module is configured to analyze historical activity records and/or historical snapshots of the domain name in the Internet Archive, and calculate the second risk score of the domain name based on the analysis result and the assigned second weight.
域名注册信息关联分析模块,用于判定域名的注册信息的全面性和/或真实性,并基于判定结果和所分配的第三权重计算域名的第三风险分值。The domain name registration information association analysis module is used to determine the comprehensiveness and/or authenticity of the registration information of the domain name, and calculate the third risk score of the domain name based on the determination result and the assigned third weight.
高频访问名单分析模块,用于判定域名当前和在过去的预设时间段内是否均在或者是否均不在源主机访问频率最高的前若干位域名名单内,并基于判定结果和所分配的第四权重计算域名的第四风险分值。The high-frequency access list analysis module is used to determine whether the domain name is currently and in the past preset time period, or whether it is not in the list of the top several domain names with the highest access frequency of the source host, and based on the determination result and the assigned No. The four weights calculate the fourth risk score for the domain name.
故障监测分析模块,用于在域名的域名服务器发生故障时监测对域名服务器发送重新查询请求的主机数目,并基于监测结果和所分配的第五权重计算域名的第五风险分值。The failure monitoring and analysis module is used to monitor the number of hosts sending re-query requests to the domain name server when the domain name server of the domain name fails, and calculate the fifth risk score of the domain name based on the monitoring result and the assigned fifth weight.
异常心跳分析模块,用于判定源主机在单位时间间隔内对域名的查询请求是否存在规律性并基于判定结果和所分配的第六权重计算域名的第六风险分值。The abnormal heartbeat analysis module is used to determine whether there is regularity in the query request of the domain name by the source host within a unit time interval, and calculate the sixth risk score of the domain name based on the determination result and the assigned sixth weight.
子域名语义分析模块,用于判定源主机所查询的域名的子域名是否具有实际意义,并基于判定结果和所分配的第七权重计算域名的第七风险分值。The subdomain name semantic analysis module is used to determine whether the subdomain name of the domain name queried by the source host has practical significance, and calculate the seventh risk score of the domain name based on the determination result and the assigned seventh weight.
其中,风险等级评估结果的计算基于以下中的至少一个:第一风险分值、第二风险分值、第三风险分值、第四风险分值、第五风险分值、第六风险分值以及第七风险分值。Wherein, the calculation of the risk level evaluation result is based on at least one of the following: first risk score, second risk score, third risk score, fourth risk score, fifth risk score, sixth risk score and the seventh risk score.
优选地,域名风险等级评估模块还用于将进行了风险等级评估的域名以及与域名相对应的风险等级评估结果录入到域名风险等级数据库中。Preferably, the domain name risk level assessment module is also used to input the domain name with risk level assessment and the risk level assessment result corresponding to the domain name into the domain name risk level database.
本发明实施例的各个模块可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的技术人员应当理解,可以在实践中使用微处理器或者数字信号处理器(DSP)来实现根据本发明实施例的医疗化验单图像分类装置中的一些或者全部部件的一些或者全部功能。本发明还可以实现为用于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本发明的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在存储载体上提供,或者以任何其他形式提供。Each module of the embodiment of the present invention may be realized by hardware, or by a software module running on one or more processors, or by a combination thereof. Those skilled in the art should understand that a microprocessor or a digital signal processor (DSP) can be used in practice to implement some or all functions of some or all components in the medical laboratory sheet image classification device according to the embodiment of the present invention. The present invention can also be implemented as an apparatus or an apparatus program (for example, a computer program and a computer program product) for performing a part or all of the methods described herein. Such a program for realizing the present invention may be stored on a computer-readable medium, or may be in the form of one or more signals. Such a signal may be downloaded from an Internet site, or provided on a storage carrier, or provided in any other form.
本发明已经通过上述实施例进行了说明,但应当理解的是,上述实施例只是用于举例和说明的目的,而非意在将本发明限制于所描述的实施例范围内。此外本领域技术人员可以理解的是,本发明并不局限于上述实施例,根据本发明的教导还可以做出更多种的变型和修改,这些变型和修改均落在本发明所要求保护的范围以内。本发明的保护范围由附属的权利要求书及其等效范围所界定。The present invention has been described through the above-mentioned embodiments, but it should be understood that the above-mentioned embodiments are only for the purpose of illustration and description, and are not intended to limit the present invention to the scope of the described embodiments. In addition, those skilled in the art can understand that the present invention is not limited to the above-mentioned embodiments, and more variations and modifications can be made according to the teachings of the present invention, and these variations and modifications all fall within the claimed scope of the present invention. within the range. The protection scope of the present invention is defined by the appended claims and their equivalent scope.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510502141.8A CN105119915A (en) | 2015-08-14 | 2015-08-14 | Malicious domain detection method and device based on intelligence analysis |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510502141.8A CN105119915A (en) | 2015-08-14 | 2015-08-14 | Malicious domain detection method and device based on intelligence analysis |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN105119915A true CN105119915A (en) | 2015-12-02 |
Family
ID=54667803
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201510502141.8A Pending CN105119915A (en) | 2015-08-14 | 2015-08-14 | Malicious domain detection method and device based on intelligence analysis |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN105119915A (en) |
Cited By (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108134776A (en) * | 2017-11-28 | 2018-06-08 | 厦门白山耘科技有限公司 | A kind of positioning is by the method and system of the domain name of DDOS attack |
| CN109831459A (en) * | 2019-03-22 | 2019-05-31 | 百度在线网络技术(北京)有限公司 | Method, apparatus, storage medium and the terminal device of secure access |
| CN110324295A (en) * | 2018-03-30 | 2019-10-11 | 阿里巴巴集团控股有限公司 | A kind of defence method and device of domain name system extensive aggression |
| US20200045070A1 (en) * | 2017-04-01 | 2020-02-06 | NSFOCUS Information Technology Co., Ltd. | Dns evaluation method and apparatus |
| CN110866259A (en) * | 2019-11-14 | 2020-03-06 | 杭州安恒信息技术股份有限公司 | Method and system for calculating potential safety hazard score based on multi-dimensional data |
| CN110968897A (en) * | 2019-12-28 | 2020-04-07 | 辽宁振兴银行股份有限公司 | Routing forwarding based on nginx and vx-api-gatway |
| CN111131175A (en) * | 2019-12-04 | 2020-05-08 | 互联网域名系统北京市工程研究中心有限公司 | Threat intelligence domain name protection system and method |
| CN111683087A (en) * | 2020-06-07 | 2020-09-18 | 中信银行股份有限公司 | Access control method, device, electronic equipment and computer readable storage medium |
| CN112070406A (en) * | 2020-09-11 | 2020-12-11 | 国网北京市电力公司 | Equipment risk processing method and device for power transmission equipment and electronic device |
| CN114844857A (en) * | 2022-04-02 | 2022-08-02 | 南京邮电大学 | Domain-based website HTTPS deployment measurement automation method |
| CN115022018A (en) * | 2022-05-31 | 2022-09-06 | 哈尔滨工业大学(威海) | Method for dynamically adjusting reported and administered malicious domain name based on network entity |
| CN116760645A (en) * | 2023-08-22 | 2023-09-15 | 北京长亭科技有限公司 | Malicious domain name detection method and device |
| CN119675890A (en) * | 2024-10-15 | 2025-03-21 | 北京亚鸿世纪科技发展有限公司 | A method for identifying malicious domain names based on search engines and generative language models |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101310502A (en) * | 2005-09-30 | 2008-11-19 | 趋势科技股份有限公司 | Security management device, communication system and access control method |
| CN101883180A (en) * | 2010-05-11 | 2010-11-10 | 中兴通讯股份有限公司 | Method and system for shielding information in wireless network accessed by mobile terminal and mobile terminal |
| CN102801697A (en) * | 2011-12-20 | 2012-11-28 | 北京安天电子设备有限公司 | Malicious code detection method and system based on plurality of URLs (Uniform Resource Locator) |
| CN102945340A (en) * | 2012-10-23 | 2013-02-27 | 北京神州绿盟信息安全科技股份有限公司 | Information object detection method and system |
| US20130097699A1 (en) * | 2011-10-18 | 2013-04-18 | Mcafee, Inc. | System and method for detecting a malicious command and control channel |
| CN103259805A (en) * | 2013-06-09 | 2013-08-21 | 中国科学院计算技术研究所 | Domain name access control method and system based on user evaluation |
-
2015
- 2015-08-14 CN CN201510502141.8A patent/CN105119915A/en active Pending
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101310502A (en) * | 2005-09-30 | 2008-11-19 | 趋势科技股份有限公司 | Security management device, communication system and access control method |
| CN101883180A (en) * | 2010-05-11 | 2010-11-10 | 中兴通讯股份有限公司 | Method and system for shielding information in wireless network accessed by mobile terminal and mobile terminal |
| US20130097699A1 (en) * | 2011-10-18 | 2013-04-18 | Mcafee, Inc. | System and method for detecting a malicious command and control channel |
| CN102801697A (en) * | 2011-12-20 | 2012-11-28 | 北京安天电子设备有限公司 | Malicious code detection method and system based on plurality of URLs (Uniform Resource Locator) |
| CN102945340A (en) * | 2012-10-23 | 2013-02-27 | 北京神州绿盟信息安全科技股份有限公司 | Information object detection method and system |
| CN103259805A (en) * | 2013-06-09 | 2013-08-21 | 中国科学院计算技术研究所 | Domain name access control method and system based on user evaluation |
Cited By (18)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11431742B2 (en) * | 2017-04-01 | 2022-08-30 | NSFOCUS Information Technology Co., Ltd. | DNS evaluation method and apparatus |
| US20200045070A1 (en) * | 2017-04-01 | 2020-02-06 | NSFOCUS Information Technology Co., Ltd. | Dns evaluation method and apparatus |
| CN108134776A (en) * | 2017-11-28 | 2018-06-08 | 厦门白山耘科技有限公司 | A kind of positioning is by the method and system of the domain name of DDOS attack |
| CN110324295A (en) * | 2018-03-30 | 2019-10-11 | 阿里巴巴集团控股有限公司 | A kind of defence method and device of domain name system extensive aggression |
| CN110324295B (en) * | 2018-03-30 | 2022-04-12 | 阿里云计算有限公司 | Defense method and device for domain name system flooding attack |
| CN109831459A (en) * | 2019-03-22 | 2019-05-31 | 百度在线网络技术(北京)有限公司 | Method, apparatus, storage medium and the terminal device of secure access |
| CN110866259A (en) * | 2019-11-14 | 2020-03-06 | 杭州安恒信息技术股份有限公司 | Method and system for calculating potential safety hazard score based on multi-dimensional data |
| CN111131175A (en) * | 2019-12-04 | 2020-05-08 | 互联网域名系统北京市工程研究中心有限公司 | Threat intelligence domain name protection system and method |
| CN110968897A (en) * | 2019-12-28 | 2020-04-07 | 辽宁振兴银行股份有限公司 | Routing forwarding based on nginx and vx-api-gatway |
| CN111683087A (en) * | 2020-06-07 | 2020-09-18 | 中信银行股份有限公司 | Access control method, device, electronic equipment and computer readable storage medium |
| CN112070406A (en) * | 2020-09-11 | 2020-12-11 | 国网北京市电力公司 | Equipment risk processing method and device for power transmission equipment and electronic device |
| CN114844857A (en) * | 2022-04-02 | 2022-08-02 | 南京邮电大学 | Domain-based website HTTPS deployment measurement automation method |
| CN114844857B (en) * | 2022-04-02 | 2023-08-25 | 南京邮电大学 | Automatic website HTTPS deployment measurement method based on domain name |
| CN115022018A (en) * | 2022-05-31 | 2022-09-06 | 哈尔滨工业大学(威海) | Method for dynamically adjusting reported and administered malicious domain name based on network entity |
| CN115022018B (en) * | 2022-05-31 | 2023-09-01 | 哈尔滨工业大学(威海) | Method for controlling malicious domain name based on dynamic adjustment reporting of network entity |
| CN116760645A (en) * | 2023-08-22 | 2023-09-15 | 北京长亭科技有限公司 | Malicious domain name detection method and device |
| CN116760645B (en) * | 2023-08-22 | 2023-11-14 | 北京长亭科技有限公司 | Malicious domain name detection method and device |
| CN119675890A (en) * | 2024-10-15 | 2025-03-21 | 北京亚鸿世纪科技发展有限公司 | A method for identifying malicious domain names based on search engines and generative language models |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN105141598B (en) | APT attack detection method and device based on the detection of malice domain name | |
| CN105072119A (en) | Domain name resolution conversation mode analysis-based method and device for detecting malicious domain name | |
| CN105072120A (en) | Method and device for malicious domain name detection based on domain name service state analysis | |
| CN105119915A (en) | Malicious domain detection method and device based on intelligence analysis | |
| JP7340368B2 (en) | Extracting and responding to network threat indicators | |
| US10104095B2 (en) | Automatic stability determination and deployment of discrete parts of a profile representing normal behavior to provide fast protection of web applications | |
| US8244752B2 (en) | Classifying search query traffic | |
| Perdisci et al. | Early detection of malicious flux networks via large-scale passive DNS traffic analysis | |
| Chiew et al. | Leverage website favicon to detect phishing websites | |
| US20180137196A1 (en) | Trustable web searching verification in a blockchain | |
| WO2018176874A1 (en) | Dns evaluation method and apparatus | |
| CN106453412A (en) | Malicious domain name determination method based on frequency characteristics | |
| WO2014036801A1 (en) | Method for detecting phishing website without depending on sample | |
| WO2009155453A1 (en) | System and method for fast flux detection | |
| US20110247073A1 (en) | System and method for adapting an internet and intranet filtering system | |
| CN111600865A (en) | A kind of abnormal communication detection method, device and electronic equipment and storage medium | |
| US20180013774A1 (en) | Collaborative security lists | |
| US20120117034A1 (en) | Context-aware apparatus and method | |
| US10313127B1 (en) | Method and system for detecting and alerting users of device fingerprinting attempts | |
| US9286402B2 (en) | System for detecting link spam, a method, and an associated computer readable medium | |
| CN119646579A (en) | Data processing method, device, storage medium and computer equipment | |
| CN115001724B (en) | Network threat intelligence management method, device, computing equipment and computer readable storage medium | |
| CN112398852A (en) | Message detection method, device, storage medium and electronic equipment | |
| US9231971B2 (en) | Protecting a user from a compromised web resource | |
| CN117033552A (en) | Information evaluation method, device, electronic equipment and storage medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| CB03 | Change of inventor or designer information |
Inventor after: An Jing Inventor after: Hong Dong Inventor after: Xue Pan Inventor after: Zhang Chen Inventor after: Fan Wenqing Inventor after: Li Meicong Inventor after: Wang Yongbin Inventor after: Huang Wei Inventor after: Du Xuetao Inventor after: Zhao Bei Inventor after: Wu Richev Inventor after: Ma Lipeng Inventor after: Chang Ling Inventor after: Zhang Gaoshan Inventor before: An Jing Inventor before: Huang Wei Inventor before: Fan Wenqing Inventor before: Li Meicong Inventor before: Wang Yongbin Inventor before: Sui Aina Inventor before: Zou Quanchen Inventor before: Li Jianfang |
|
| COR | Change of bibliographic data | ||
| RJ01 | Rejection of invention patent application after publication | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20151202 |