2021
DOI: 10.1007/s10586-020-03213-z
|View full text |Cite
|
Sign up to set email alerts
|

Early DGA-based botnet identification: pushing detection to the edges

Abstract: With the first commercially available 5G infrastructures, worldwide's attention is shifting to the next generation of theorised technologies that might be finally deployable. In this context, the cybersecurity of edge equipment and end-devices must be a top priority as botnets see their spread remarkably increase. Most of them rely on algorithmically generated domain names (AGDs) to evade detection and remain shrouded from intrusion detection systems, via the so-called Domain Generation Algorithm (DGA). Despit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 40 publications
(92 reference statements)
0
2
0
Order By: Relevance
“…This implies that there is need for endpoints to be secured, data in transit and at rest should be encrypted. With reference to critical assets and applications; and the risk appetite, cloud and hybrid architectures are required need to be adequately configured regarding authorization, segmentation, encryption and authentication for significant perimeters with DMZs (Demilitarized Zone in perimeter networks) and firewalls or follow a complete zero trust model if it is allowed by resources [20]. Security reviews and cloud security gap analyses assist in searching for weaknesses and misconfigurations.…”
Section: Defensive Cyber Security Measures and Mitigationsmentioning
confidence: 99%
“…This implies that there is need for endpoints to be secured, data in transit and at rest should be encrypted. With reference to critical assets and applications; and the risk appetite, cloud and hybrid architectures are required need to be adequately configured regarding authorization, segmentation, encryption and authentication for significant perimeters with DMZs (Demilitarized Zone in perimeter networks) and firewalls or follow a complete zero trust model if it is allowed by resources [20]. Security reviews and cloud security gap analyses assist in searching for weaknesses and misconfigurations.…”
Section: Defensive Cyber Security Measures and Mitigationsmentioning
confidence: 99%
“…The explanation is attributable to subgraph decomposition theory [198], where it is feasible to determine whether the learned model is interpretable by identifying the subgraph with the most significant influence on prediction and judging whether the subgraph is faithful to general knowledge. [199]- [201], three explainable studies focused on DGAbased botnet detection, are also worth mentioning, as is [202],in which the authors created a Gradient-based Explainable Variational Autoencoder for Network Anomaly Detection utilizing a BotNet dataset as a test.…”
Section: ) Explainable Artificial Intelligence In Bot(net) Detectionmentioning
confidence: 99%
“…Moreover, the DGA-based botnet type is one of the most disruptive and challenging to be detected since it hides its queries throughout the domain name system (DNS) traffics and uses CNC servers' domain names generated algorithmically [9]. Furthermore, in the current 5G and B5G networks era, potentially billions of smart devices are susceptible to botnet DGA attacks [10]. Since detecting DGA-based botnets is essential, we are well motivated to conduct our research in this paper.…”
Section: Botnet Dga and Hybrid Quantum Deep Learningmentioning
confidence: 99%