2018
DOI: 10.1109/lcomm.2018.2828800
|View full text |Cite
|
Sign up to set email alerts
|

Estimating the Randomness of Domain Names for DGA Bot Callbacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

4
3

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…This framework leverages the behaviors of DNS queries for detecting infected machines because C&C domains have different characteristics when compared with other domains. Besides the above work, various methods based on query behaviors have been proposed for detecting the certain types of threats, such as botnets [20], advanced persistent threat attacks [21], and water torture attacks [22].…”
Section: Related Workmentioning
confidence: 99%
“…This framework leverages the behaviors of DNS queries for detecting infected machines because C&C domains have different characteristics when compared with other domains. Besides the above work, various methods based on query behaviors have been proposed for detecting the certain types of threats, such as botnets [20], advanced persistent threat attacks [21], and water torture attacks [22].…”
Section: Related Workmentioning
confidence: 99%
“…This proposed approach was initially introduced in our previous work [40]. In this paper, we considerably extend the previous study by further enhancing the sophistication of each function, evaluating the approach from various perspectives through experiments, extensively discussing the experimental results, and comparing our approach with several published methods.…”
Section: Proposalmentioning
confidence: 83%
“…The domain name that returns the correct response is considered as the C&C. However, since the lifetimes of domain names generated for such callbacks are extremely short, it is difficult for conventional security appliances that monitor communications with known malicious domains to detect callbacks caused by DGA malware. Some previous studies [3][4][5] have focused on identifying discernible differences in the character strings of benign and malicious domain names for detecting the callbacks of DGA malware. For example, Truong et al [4] proposed a method that learns and predicts the character patterns in domain names using bigram models with supervised learning algorithms, and Anderson et al [5] extended this method to include characterlevel modeling with long short-term memory (LSTM) networks.…”
Section: Introductionmentioning
confidence: 99%