Back to Search
Start Over
Detection of DGA-Generated Domain Names with TF-IDF.
- Source :
- Electronics (2079-9292); Feb2022, Vol. 11 Issue 3, p414-N.PAG, 1p
- Publication Year :
- 2022
-
Abstract
- Botnets often apply domain name generation algorithms (DGAs) to evade detection by generating large numbers of pseudo-random domain names of which only few are registered by cybercriminals. In this paper, we address how DGA-generated domain names can be detected by means of machine learning and deep learning. We first present an extensive literature review on recent prior work in which machine learning and deep learning have been applied for detecting DGA-generated domain names. We observe that a common methodology is still missing, and the use of different datasets causes that experimental results can hardly be compared. We next propose the use of TF-IDF to measure frequencies of the most relevant n-grams in domain names, and use these as features in learning algorithms. We perform experiments with various machine-learning and deep-learning models using TF-IDF features, of which a deep MLP model yields the best results. For comparison, we also apply an LSTM model with embedding layer to convert domain names from a sequence of characters into a vector representation. The performance of our LSTM and MLP models is rather similar, achieving 0.994 and 0.995 AUC, and average F1-scores of 0.907 and 0.891 respectively. [ABSTRACT FROM AUTHOR]
- Subjects :
- DEEP learning
MACHINE learning
BOTNETS
ALGORITHMS
LITERATURE reviews
Subjects
Details
- Language :
- English
- ISSN :
- 20799292
- Volume :
- 11
- Issue :
- 3
- Database :
- Complementary Index
- Journal :
- Electronics (2079-9292)
- Publication Type :
- Academic Journal
- Accession number :
- 155241683
- Full Text :
- https://doi.org/10.3390/electronics11030414