2019 IEEE 31st International Conference on Tools With Artificial Intelligence (ICTAI) 2019
DOI: 10.1109/ictai.2019.00121
|View full text |Cite
|
Sign up to set email alerts
|

Integrating an Attention Mechanism and Deep Neural Network for Detection of DGA Domain Names

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…In subsequent research, ref. [25,26,[30][31][32][33] chose to cut out a few sample categories to improve the detection accuracy of other categories. But in network security, the uncommon DGA categories with few samples are the ones that we should be cautious about because hackers use uncommon DGA to increase the probability of successful intrusion.…”
Section: Dga Detectionmentioning
confidence: 99%
“…In subsequent research, ref. [25,26,[30][31][32][33] chose to cut out a few sample categories to improve the detection accuracy of other categories. But in network security, the uncommon DGA categories with few samples are the ones that we should be cautious about because hackers use uncommon DGA to increase the probability of successful intrusion.…”
Section: Dga Detectionmentioning
confidence: 99%
“…Bharathi et al [14] proposed to take a string of characters as the input given in the domain names and classify them as either benign or malicious domain names using deep learning architectures such as Long-Short-Term Memory (LSTM) and bidirectional LSTM. Ren et al [15] applied a deep neural network model with an attention mechanism (ATT-CNN-BiLSTM) for the detection and classification of DGA domain names. The main thought behind their ensemble model is that the validity of the context inherent in domains could contain sufficient information with which to distinguish DGA domain names, especially the wordlist-based ones.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, NER in CTI plays a major role in supporting and achieving cybersecurity research. Researches about NER in CTI have been widely pursued in recent years, and they can be summarized in the following three categories: rules-based [2], [3], [4], [5], [6], statistical characteristicsbased [7], [8], [9], [10], [11] and deep learning-based [12], [13], [14], [15], [16], [17], [18], [19].…”
Section: Introductionmentioning
confidence: 99%
“…Deep neural networks like recurrent neural networks(RNN) [21] and convolutional neural networks(CNN) [22] with their variants learn intricate features and discover the semantic information automatically from raw data via non-linear activation functions in multiple processing layers [23]. These neural models can be trained in an end-to-end paradigm by gradient descent, and they have been widely used for NER in CTI such as [17], [16], [18], [13].…”
Section: Introductionmentioning
confidence: 99%