Proceedings of the 14th International Conference on Availability, Reliability and Security 2019
DOI: 10.1145/3339252.3339258
|View full text |Cite
|
Sign up to set email alerts
|

Detecting DGA domains with recurrent neural networks and side information

Abstract: Modern malware typically makes use of a domain generation algorithm (DGA) to avoid command and control domains or IPs being seized or sinkholed. This means that an infected system may attempt to access many domains in an attempt to contact the command and control server. Therefore, the automatic detection of DGA domains is an important task, both for the sake of blocking malicious domains and identifying compromised hosts. However, many DGAs use English wordlists to generate plausibly clean-looking domain name… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 44 publications
(28 citation statements)
references
References 36 publications
0
28
0
Order By: Relevance
“…In the case of [31], the authors are able to characterize and classify similar DGA-generated domains, generating knowledge about the evolving behaviour of botnets. More recently, Curtin et al developed the smashword score [32], a new metric that uses n-gram overlapping combined with information provided from WHOIS lookups to determine whether a DGA has generated a domain name or not. For a detailed overview and classification of methods of how malicious domains can be detected, the interested reader may refer to [33].…”
Section: Related Workmentioning
confidence: 99%
“…In the case of [31], the authors are able to characterize and classify similar DGA-generated domains, generating knowledge about the evolving behaviour of botnets. More recently, Curtin et al developed the smashword score [32], a new metric that uses n-gram overlapping combined with information provided from WHOIS lookups to determine whether a DGA has generated a domain name or not. For a detailed overview and classification of methods of how malicious domains can be detected, the interested reader may refer to [33].…”
Section: Related Workmentioning
confidence: 99%
“…According to the authors, the model could detect 97.3% of malware-generated domain names with a low false positive rate. Curtin et al [55] also took a similar approach using the generalized likelihood ratio test (GLRT) and achieved promising results.…”
Section: Identifying Domain Names Generated By Dgasmentioning
confidence: 99%
“…The results show that DL models perform well when compared to ML models and LSTM achieves the highest detection accuracy. In [568], a RNN based robust DGA detection system which takes advantage of additional WHOIS information if available to enhance the performance of the system and to classify much more difficult DGA families. A novel measure called smashword score is also proposed which ranks DGAs based on how close the domains resemble English words.…”
Section: A Deep Learning In Intrusion Detectionmentioning
confidence: 99%