2019
DOI: 10.1109/access.2019.2940554
|View full text |Cite
|
Sign up to set email alerts
|

Malicious Domain Names Detection Algorithm Based on Lexical Analysis and Feature Quantification

Abstract: Malicious domain names usually refer to a series of illegal activities, posing threats to people's privacy and property. Therefore, the problem of detecting malicious domain names has aroused widespread concerns. In this study, a malicious domain names detection algorithm based on lexical analysis and feature quantification is proposed. To achieve efficient and accurate detection, the method includes two phases. The first phase checks an observed domain name against a blacklist of known malicious uniform resou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(4 citation statements)
references
References 35 publications
0
4
0
Order By: Relevance
“…A path-based mechanism was used to derive a malicious score for each domain. A different approach proposed in [46] calculated the reputation score based on domain name lexical features.…”
Section: ) Algorithmic Methodsmentioning
confidence: 99%
“…A path-based mechanism was used to derive a malicious score for each domain. A different approach proposed in [46] calculated the reputation score based on domain name lexical features.…”
Section: ) Algorithmic Methodsmentioning
confidence: 99%
“…23 lexical characteristics are extracted from the URL, and the Random Forest algorithm achieves 92% accuracy. Lexical analysis and feature quantification are used by Hong et al [7] to identify harmful domain names. For successful and precise detection, the approach consists of two stages.…”
Section: Related Workmentioning
confidence: 99%
“…Any dialogue concerning statistics has to cope with security and privacy especially in relation to handling more sensitive data. The events in the code area and server space that led to statistics deletion and eventual shut down of the company should not be neglected [20], [21]. So, dependence on service providers carries potential risk of data leakage and security breach.…”
Section: Problem Definition and Motivationmentioning
confidence: 99%