Back to Search
Start Over
Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference
- Source :
- ACM Transactions on Privacy and Security. 23:1-36
- Publication Year :
- 2020
- Publisher :
- Association for Computing Machinery (ACM), 2020.
-
Abstract
- Malicious domains, including phishing websites, spam servers, and command and control servers, are the reason for many of the cyber attacks nowadays. Thus, detecting them in a timely manner is important to not only identify cyber attacks but also take preventive measures. There has been a plethora of techniques proposed to detect malicious domains by analyzing Domain Name System (DNS) traffic data. Traditionally, DNS acts as an Internet miscreant’s best friend, but we observe that the subtle traces in DNS logs left by such miscreants can be used against them to detect malicious domains. Our approach is to build a set of domain graphs by connecting “related” domains together and injecting known malicious and benign domains into these graphs so that we can make inferences about the other domains in the domain graphs. A key challenge in building these graphs is how to accurately identify related domains so that incorrect associations are minimized and the number of domains connected from the dataset is maximized. Based on our observations, we first train two classifiers and then devise a set of association rules that assist in linking domains together. We perform an in-depth empirical analysis of the graphs built using these association rules on passive DNS data and show that our techniques can detect many more malicious domains than the state-of-the-art.
- Subjects :
- 021110 strategic, defence & security studies
General Computer Science
Association rule learning
business.industry
Computer science
Domain Name System
0211 other engineering and technologies
020206 networking & telecommunications
02 engineering and technology
computer.software_genre
Phishing
Domain (software engineering)
Set (abstract data type)
Server
0202 electrical engineering, electronic engineering, information engineering
Key (cryptography)
The Internet
Data mining
Safety, Risk, Reliability and Quality
business
computer
Subjects
Details
- ISSN :
- 24712574 and 24712566
- Volume :
- 23
- Database :
- OpenAIRE
- Journal :
- ACM Transactions on Privacy and Security
- Accession number :
- edsair.doi...........f395e5079a1791a9bac0b2f3124981dd