CL-GAN: A GAN-based continual learning model for generating and detecting AGDs

被引:1
作者
Ren, Yimo [1 ,2 ]
Li, Hong [1 ,2 ]
Liu, Peipei [1 ,2 ]
Liu, Jie [1 ,2 ]
Zhu, Hongsong [1 ,2 ]
Sun, Limin [1 ,2 ]
机构
[1] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Network security; Domain generation algorithms; Prompt noises; Generative adversarial nets; Continual learning;
D O I
10.1016/j.cose.2023.103317
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Botnets often use Domain Generation Algorithms (DGAs) to generate lots of Algorithmically Generated Domains (AGDs), which seem real, to hide their attacks. So, knowing the DGAs is very helpful for the precise and fast detection of AGDs, which is essential for network security. However, the detection of AGDs still needs further improvement due to existing problems. First, various DGAs change at any time, bringing the need for models to fit quickly in the pattern of new DGAs. Second, the mechanisms of different DGAs are divergent. Therefore, it requires a strong ability of models to learn the DGAs well. Third, most AGDs are blind to people, so models trained on available data are difficulty having generalized detection ability. To solve these problems, the paper proposes CL-GAN: A GAN-based Continual Learning Model for Generating and Detecting AGDs. CL-GAN is based on Generative Adversarial Networks (GAN) and includes three parts: a Generator to learn the DGAs, a Discriminator to detect the AGDs and a Teacher to provide existing learned knowledge. Further, CL-GAN also constructs prompt noises to enhance the ability to generate AGDs of the Generator. The paper conducts experiments on the domains from 360DGA and Alexa Top 1M. Compared with existing models, the results show the generality and effectiveness of CL-GAN and its life-long ability to detect AGDs.& COPY; 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:8
相关论文
共 27 条
[11]  
Fernando C., 2017, arXiv
[12]   Stealthy Domain Generation Algorithms [J].
Fu, Yu ;
Yu, Lu ;
Hambolu, Oluwakemi ;
Ozcelik, Ilker ;
Husain, Benafsh ;
Sun, Jingxuan ;
Sapra, Karan ;
Du, Dan ;
Beasley, Christopher Tate ;
Brooks, Richard R. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (06) :1430-1443
[13]   Generative Adversarial Networks [J].
Goodfellow, Ian ;
Pouget-Abadie, Jean ;
Mirza, Mehdi ;
Xu, Bing ;
Warde-Farley, David ;
Ozair, Sherjil ;
Courville, Aaron ;
Bengio, Yoshua .
COMMUNICATIONS OF THE ACM, 2020, 63 (11) :139-144
[14]   Knowledge Distillation: A Survey [J].
Gou, Jianping ;
Yu, Baosheng ;
Maybank, Stephen J. ;
Tao, Dacheng .
INTERNATIONAL JOURNAL OF COMPUTER VISION, 2021, 129 (06) :1789-1819
[15]  
Hinton G., 2015, CoRR abs/1503.02531
[16]  
Jiang H, 2023, Arxiv, DOI arXiv:2304.09960
[17]   TRANCO: A Research-Oriented Top Sites Ranking Hardened Against Manipulation [J].
Le Pochat, Victor ;
Van Goethem, Tom ;
Tajalizadehkhoob, Samaneh ;
Korczynski, Maciej ;
Joosen, Wouter .
26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
[18]   HAGDetector: Heterogeneous DGA domain name detection model [J].
Liang, Jianbing ;
Chen, Shuhui ;
Wei, Ziling ;
Zhao, Shuang ;
Zhao, Wei .
COMPUTERS & SECURITY, 2022, 120
[19]  
Liu P., 2021, arXiv, DOI 10.48550/arXiv.2107.13586
[20]  
Raffel C, 2020, J MACH LEARN RES, V21