Page 55 - Read Online
P. 55

Page 48                                                               Kim et al. J Surveill Secur Saf 2020;1:34-60  I  http://dx.doi.org/10.20517/jsss.2020.14












































                              Figure 10. Demonstrating the DNS attack using abuse of DNS. DNS: Domain Name System

               An attacker uses a C&C server to make it difficult to find the source of an attack and to scale to large
               numbers of bots. To counteract the development of methods for detecting C&C servers, an attacker exploits
               DNS to hide the location of C&C servers or to exfiltrate traffic to conceal the attack. To bypass firewalls, an
               attacker attempts to send malicious commands from inside a network to an external C&C server. In such a
               case, an attacker could conceal the information of the C&C server by using seemingly innocuous DNS (DNS
               TTL, NXDOMAIN) records, as shown in Figure 10.


               4.3.1 DA07. DNS tunneling
               DNS Tunneling is a type of bypass technology that allows an attacker to send attack commands and
               receive the results without blocking by the defense system. DNS requests may use up to 255 characters for
               a domain name, and subdomains separated by “.” can be up to 63 characters. For example, if an attacker
               sends a DNS query of “ghAAAAATTTAAAACCCKKakdg.malware.com”, the malware.com name server,
               as the C&C server, accepts the query as a malicious attack command. Conversely, the malware.com name
               server exploits records (A, CNAME, TXT) of the DNS response query to include the results for that attack
               command. Since an attacker and a C&C server communicate through DNS port 53, DNS tunneling may
               evade a defensive system [45,46] .


               4.3.2 DA08. domain generation algorithm
               Domain generation algorithm (DGA) is an algorithm that randomly generates a large number of domains
                                                 [47]
               (from hundreds to tens of thousands) . An attacker uses DGA to support malware attacks. First, an
               attacker attempts an attack by sending malicious commands to many botnets infected with malware
   50   51   52   53   54   55   56   57   58   59   60