2018 International Conference on Information Networking (ICOIN) 2018
DOI: 10.1109/icoin.2018.8343077
|View full text |Cite
|
Sign up to set email alerts
|

Proactive detection of algorithmically generated malicious domains

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…Domain Generation Algorithms (DGAs) are utilized to intermittently produce a large number of domain names for malicious purposes. There exist several research works that explored the ecosystem of DGAs [59,60,61,28,12,62].…”
Section: Dns Threat Landscapementioning
confidence: 99%
See 3 more Smart Citations
“…Domain Generation Algorithms (DGAs) are utilized to intermittently produce a large number of domain names for malicious purposes. There exist several research works that explored the ecosystem of DGAs [59,60,61,28,12,62].…”
Section: Dns Threat Landscapementioning
confidence: 99%
“…For example, Figure 7 shows an overview of the communication of malware-infected hosts with C&C servers. There exist several research works that explored the ecosystem of DGAs [59,60,61,28,12,62].…”
Section: Domain Generation Algorithmmentioning
confidence: 99%
See 2 more Smart Citations
“…Related to our use of network features is a line of research on traffic analysis for malware and botnet detection. Such works include [39][40][41][42][43][44], with others paying particular attention to the use of fast-flux techniques [45][46][47][48][49][50]. Support for our use of DNS features for malware analysis comes in [51][52][53].…”
Section: Related Workmentioning
confidence: 99%