2021
DOI: 10.1016/j.dib.2021.107342
|View full text |Cite
|
Sign up to set email alerts
|

DNS dataset for malicious domains detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…We use a public dataset in this study that has been collected and processed by Marques et al [19]. The dataset contains approximately 90,000 malicious and non-malicious domain name samples of equal size.…”
Section: Datasetmentioning
confidence: 99%
“…We use a public dataset in this study that has been collected and processed by Marques et al [19]. The dataset contains approximately 90,000 malicious and non-malicious domain name samples of equal size.…”
Section: Datasetmentioning
confidence: 99%
“…The dataset used in this study was released by Marques et al [34] in 2021 to classify the data sample as malicious or non-malicious. It was created from DNS logs, where the non-malicious domain were acquired from Rapid7 Labs [35] and the malicious domains from SANS Internet Storm Center (SANS) public list [36].…”
Section: Dataset Descriptionmentioning
confidence: 99%
“…We investigate which type of fea-tures leads to more accurate classification results (i.e., does the feature category affect the classification accuracy of domain names?). Using a recent DNS dataset [26], five machine learning algorithms are trained separately using one of the three feature categories: hostbased, lexicalbased, and a combination of both. Then, we explore feature importance using four feature importance measures to answer the question of what are the most influential features in the automatic detection of malicious domain names.…”
Section: Introductionmentioning
confidence: 99%