2015 International Conference on Communications, Management and Telecommunications (ComManTel) 2015
DOI: 10.1109/commantel.2015.7394256
|View full text |Cite
|
Sign up to set email alerts
|

Detecting bot-infected machines based on analyzing the similar periodic DNS queries

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…ey leveraged the deterministic nature of such algorithms and trained a deep neural network composed of LSTM, CNN and ANN in order to identify whether a paritcular host was making DNS calls for domains that were DGA generated. In a similar study Tu et al [15] leveraged the similarity of DNS queries in order to identify bot-infected machines.…”
Section: Bots and Botnetsmentioning
confidence: 99%
“…ey leveraged the deterministic nature of such algorithms and trained a deep neural network composed of LSTM, CNN and ANN in order to identify whether a paritcular host was making DNS calls for domains that were DGA generated. In a similar study Tu et al [15] leveraged the similarity of DNS queries in order to identify bot-infected machines.…”
Section: Bots and Botnetsmentioning
confidence: 99%
“…Machine learning (ML) methods, using static [27] and dynamic [28] investigation to classify malicious contend [29], to achieve network traffic arrangement [30], to analyze malware traffic [31] and to identify botnets [32], has been done in the past. In contrast, numerous writers suggest different classifications methods or discovery procedures, presenting alternative classes of botnet detection [33,34]. Generally, the traffic analysis with machine learning-based methods has proved effective in the investigation of some of the biggest and most harmful cyber-attacks over the past decade [35][36][37].…”
Section: Related Workmentioning
confidence: 99%
“…A method presented based on analyzing the similar periodic time intervals series of DNS queries to identify DGA-bot-infected machines [11]. To measure the similar periodicity of DNS queries, the squared Euclidean distance between each pair of their time interval series is calculated.…”
Section: Introductionmentioning
confidence: 99%