Proceedings of the 2018 International Conference on Mathematics, Modelling, Simulation and Algorithms (MMSA 2018) 2018
DOI: 10.2991/mmsa-18.2018.58
|View full text |Cite
|
Sign up to set email alerts
|

A Detection Scheme for DGA Domain Names Based on SVM

Abstract: Most of network security configurations allow the DNS data to pass through. Therefore, the crackers often embed malware commands in DNS data to avoid the security detection by the Internet facilities. Especially, some malwares, such as the botnet, generate a large number of spare domain names using a Domain Generation Algorithm (DGA) and choose some of them as the masks of malware's commands. How to filter out the DGA domain names from the normal domain names becomes a hot topic in literature. There are many p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 11 publications
(12 reference statements)
0
5
0
Order By: Relevance
“…Content may change prior to final publication. [14], [20], [27], [29] sld_len Second level domain length [13], [14], [20] tld_len Top level domain length [13], [14], [20] uni_domain Domain Unique Characters length [13], [14], [20] uni_sld SLD Unique Characters length [13], [14], [20] uni_tld TLD Unique Characters length [13], [14], [20] flag_dga Has malicious TLD [13], [14], [20], [27] tld_hash TLD Hash [6], [13], [14], [20] flag_dig Starts with Digit [6], [13], [14], [20] sym Symbol ratio [6], [13], [14], [20] hex Hex ratio [6], [13], [14], [20] dig Digit Ratio [4], [11]- [14], [17], [20], [29] vow Vowel Ratio [4], [6]...…”
Section: Lexical Featuresmentioning
confidence: 99%
See 3 more Smart Citations
“…Content may change prior to final publication. [14], [20], [27], [29] sld_len Second level domain length [13], [14], [20] tld_len Top level domain length [13], [14], [20] uni_domain Domain Unique Characters length [13], [14], [20] uni_sld SLD Unique Characters length [13], [14], [20] uni_tld TLD Unique Characters length [13], [14], [20] flag_dga Has malicious TLD [13], [14], [20], [27] tld_hash TLD Hash [6], [13], [14], [20] flag_dig Starts with Digit [6], [13], [14], [20] sym Symbol ratio [6], [13], [14], [20] hex Hex ratio [6], [13], [14], [20] dig Digit Ratio [4], [11]- [14], [17], [20], [29] vow Vowel Ratio [4], [6]...…”
Section: Lexical Featuresmentioning
confidence: 99%
“…The RData in a DNS response encompasses a list of resolved IP addresses, the time-to-live value of the query and the type of resource record. [8], [5], [4], [15], [26] [27], [6], [14], [13], [28] Side information features [29], [30], [16], [31], [32] our work Domain name string + [18], [33], [3], [34], [35] our work side information features [17], [10], [11], [12] TABLE I Overview of existing work on DGA detection ture would be "multi-valued". Alternatively, if the location could not be identified, then this feature takes the value "unknown".…”
Section: Side Informationmentioning
confidence: 99%
See 2 more Smart Citations
“…In order to detect DGA domains, Yadav et al [4] proposed a technique based on the significant difference between traditional DGA domains and human generated domains in terms of the distribution of alphanumeric characters. In addition, Antonakakis et al [1], Schüppen et al [5] and Wang et al [6] proposed machine-learning based DGA detectors using human-engineered lexical features of DGA domain names, while Tong et al [7], Lison et al [8] and Tran et al [9] came up with some methods using deep learning algorithms such as CNN, LSTM, and BiLSTM. However, attackers have designed a more resilient class of mAGDs produced by randomly selecting and concatenating words from a dictionary in order to imitate legitimate domain names created by a human.…”
Section: A Dga and Dga Detectionmentioning
confidence: 99%