A Machine Learning Framework for Studying Domain Generation Algorithm (DGA)-Based Malware

被引:15
作者
Chin, Tommy [1 ]
Xiong, Kaiqi [2 ]
Hu, Chengbin [2 ]
Li, Yi [2 ]
机构
[1] Rochester Inst Technol, Dept Comp Secur, Rochester, NY 14623 USA
[2] Univ S Florida, Florida Ctr Cybersecur, Tampa, FL 33620 USA
来源
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I | 2018年 / 254卷
基金
美国国家科学基金会;
关键词
Malware; Domain Generation Algorithm; Machine learning; Security; Networking; SERVICE GUARANTEES;
D O I
10.1007/978-3-030-01701-9_24
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Malware or threat actors use a Command and Control (C2) environment to proliferate and manage an attack. In a sophisticated attack, a threat actor often employs a Domain Generation Algorithm (DGA) to cycle the network location in which malware communicates with C2. Network security controls such as blacklisting, implementing a DNS sinkhole, or inserting a firewall rule is a vital asset to an organization's security posture. However, all of them are typically ineffective against a DGA. In this paper, we propose a machine learning framework for identifying and clustering domain names to circumvent threats from a DGA. We collect a real-time threat intelligent feed over a six month period where all domains have threats on the public Internet at the time of collection. We then apply the proposed machine learning framework to study DGA-based malware. The proposed framework contains a two-level model, which consists of classification and clustering is used to first detect DGA domains and then identify the DGA of those domains. Our extensive experimental results demonstrate the accuracy of the proposed framework. To be precise, we achieve accuracies of 95.14% for the first-level classification and 92.45% for the second-level clustering, respectively.
引用
收藏
页码:433 / 448
页数:16
相关论文
共 42 条
[1]   Detecting Broad Length Algorithmically Generated Domains [J].
Ahluwalia, Aashna ;
Traore, Issa ;
Ganame, Karim ;
Agarwal, Nainesh .
INTELLIGENT, SECURE, AND DEPENDABLE SYSTEMS IN DISTRIBUTED AND CLOUD ENVIRONMENTS (ISDDC 2017), 2017, 10618 :19-34
[2]  
[Anonymous], BAMBENEK OSINT FEEDS
[3]  
[Anonymous], 2017, FILE PATHS REGISTRY
[4]  
[Anonymous], 2015, ARXIV150301002
[5]  
[Anonymous], 2016, TECHNOLOGIES TOP MIL
[6]  
[Anonymous], 2008, RESOURCE OPTIMIZATIO
[7]  
[Anonymous], 2017, DOM FEED KNOWN DGA D
[8]  
[Anonymous], 2008, LEET
[9]  
Antonakakis M., 2012, P 21 USENIX SEC S US, P491
[10]  
Barabosch T., 2012, P NATO S 1 111 INF A