2021
DOI: 10.1155/2021/4767388
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Approach for Detecting DGA-Based Botnets in DNS Queries Using Machine Learning Techniques

Abstract: In today’s security landscape, advanced threats are becoming increasingly difficult to detect as the pattern of attacks expands. Classical approaches that rely heavily on static matching, such as blacklisting or regular expression patterns, may be limited in flexibility or uncertainty in detecting malicious data in system data. This is where machine learning techniques can show their value and provide new insights and higher detection rates. The behavior of botnets that use domain-flux techniques to hide comma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…A sample from the gathered dataset is given in figure 3. They have two fields: Scheme Technique Disadvantage [14] Machine learning Performance Issues on large datasets [25] TFIDF models are used for detection.…”
Section: Data Collectionmentioning
confidence: 99%
See 1 more Smart Citation
“…A sample from the gathered dataset is given in figure 3. They have two fields: Scheme Technique Disadvantage [14] Machine learning Performance Issues on large datasets [25] TFIDF models are used for detection.…”
Section: Data Collectionmentioning
confidence: 99%
“…Any machine learning algorithm clearly necessitates an effective feature engineering process, and the features may also need to be changed. [25] proposed a method to extract network behaviour patterns, analyses user behaviour and records the quantity of traffic exchanged between sites. Term frequency-inverse document frequency (TFIDF) models are used to create a system for recognising behavioural patterns, and principal component analysis (PCA) is utilised to improve the speed and accuracy of diagnosis evaluation results.…”
Section: Literature Surveymentioning
confidence: 99%
“…After the progressions, they use Graph Structure Based Detection of Anomaly (GSBDA) to detect hazardous anomalies and lastly use a KNN to identify the botnet accurately. Ali and Fatemeh [151] uses DNS queries to extract features from network traffic and then apply ML to generate a botnet detection report. Their studies included testing DT, SVM, RF and Logical regression as their ML algorithms and obtained accuracies of 98%, 96%, 99% and 93% respectively.…”
Section: Machine Learning and Network-based Detection Mechanismsmentioning
confidence: 99%
“…Periodically, they can also update their control system about their working status. The method by which the botmaster provides instructions and code updates to bots is known as a "botnet control system," also known as a "command and control server" (Soleymani & Arabgol, 2021). Botnet architectures frequently employ Domain Generation Algorithms (DGAs) to avoid detection and shutdown attempts.…”
Section: Introductionmentioning
confidence: 99%