1. Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference
- Author
-
Bei Guan, Mohamed Nabeel, Ting Yu, and Issa Khalil
- Subjects
021110 strategic, defence & security studies ,General Computer Science ,Association rule learning ,business.industry ,Computer science ,Domain Name System ,0211 other engineering and technologies ,020206 networking & telecommunications ,02 engineering and technology ,computer.software_genre ,Phishing ,Domain (software engineering) ,Set (abstract data type) ,Server ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,The Internet ,Data mining ,Safety, Risk, Reliability and Quality ,business ,computer - Abstract
Malicious domains, including phishing websites, spam servers, and command and control servers, are the reason for many of the cyber attacks nowadays. Thus, detecting them in a timely manner is important to not only identify cyber attacks but also take preventive measures. There has been a plethora of techniques proposed to detect malicious domains by analyzing Domain Name System (DNS) traffic data. Traditionally, DNS acts as an Internet miscreant’s best friend, but we observe that the subtle traces in DNS logs left by such miscreants can be used against them to detect malicious domains. Our approach is to build a set of domain graphs by connecting “related” domains together and injecting known malicious and benign domains into these graphs so that we can make inferences about the other domains in the domain graphs. A key challenge in building these graphs is how to accurately identify related domains so that incorrect associations are minimized and the number of domains connected from the dataset is maximized. Based on our observations, we first train two classifiers and then devise a set of association rules that assist in linking domains together. We perform an in-depth empirical analysis of the graphs built using these association rules on passive DNS data and show that our techniques can detect many more malicious domains than the state-of-the-art.
- Published
- 2020