2023
DOI: 10.1371/journal.pone.0279866
|View full text |Cite
|
Sign up to set email alerts
|

Domain generation algorithms detection with feature extraction and Domain Center construction

Abstract: Network attacks using Command and Control (C&C) servers have increased significantly. To hide their C&C servers, attackers often use Domain Generation Algorithms (DGA), which automatically generate domain names for C&C servers. Researchers have constructed many unique feature sets and detected DGA domains through machine learning or deep learning models. However, due to the limited features contained in the domain name, the DGA detection results are limited. In order to overcome this problem, the d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…Yang Cheng and others [11] introduced a malicious domain detection method based on n-gram and Transformer, which adds start and end markers to domain data, segments them into word group elements using the n-gram algorithm, and then transforms them into vectors for input into the Transformer model. Sun and others [12] constructed a deep learning model based on BiLSTM, Attention, and CNN, employing feature extraction and dimension reduction techniques, as well as a method based on centrality construction to identify DGA domains.…”
Section: Detection Based On Domain Name Character Informationmentioning
confidence: 99%
See 1 more Smart Citation
“…Yang Cheng and others [11] introduced a malicious domain detection method based on n-gram and Transformer, which adds start and end markers to domain data, segments them into word group elements using the n-gram algorithm, and then transforms them into vectors for input into the Transformer model. Sun and others [12] constructed a deep learning model based on BiLSTM, Attention, and CNN, employing feature extraction and dimension reduction techniques, as well as a method based on centrality construction to identify DGA domains.…”
Section: Detection Based On Domain Name Character Informationmentioning
confidence: 99%
“…In this section, four models were selected for comparison: LSTM [9], HDNN [16], CNN-BiLSTM [17], and FEDCC [12]. Using the same experimental setup and dataset, comparative experiments were conducted with the CT_B model proposed in this study.…”
Section: Comparative Experimental Analysismentioning
confidence: 99%