Back to Search Start Over

Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference

Authors :
Bei Guan
Mohamed Nabeel
Ting Yu
Issa Khalil
Source :
ACM Transactions on Privacy and Security. 23:1-36
Publication Year :
2020
Publisher :
Association for Computing Machinery (ACM), 2020.

Abstract

Malicious domains, including phishing websites, spam servers, and command and control servers, are the reason for many of the cyber attacks nowadays. Thus, detecting them in a timely manner is important to not only identify cyber attacks but also take preventive measures. There has been a plethora of techniques proposed to detect malicious domains by analyzing Domain Name System (DNS) traffic data. Traditionally, DNS acts as an Internet miscreant’s best friend, but we observe that the subtle traces in DNS logs left by such miscreants can be used against them to detect malicious domains. Our approach is to build a set of domain graphs by connecting “related” domains together and injecting known malicious and benign domains into these graphs so that we can make inferences about the other domains in the domain graphs. A key challenge in building these graphs is how to accurately identify related domains so that incorrect associations are minimized and the number of domains connected from the dataset is maximized. Based on our observations, we first train two classifiers and then devise a set of association rules that assist in linking domains together. We perform an in-depth empirical analysis of the graphs built using these association rules on passive DNS data and show that our techniques can detect many more malicious domains than the state-of-the-art.

Details

ISSN :
24712574 and 24712566
Volume :
23
Database :
OpenAIRE
Journal :
ACM Transactions on Privacy and Security
Accession number :
edsair.doi...........f395e5079a1791a9bac0b2f3124981dd