Generative Adversarial Networks for Subdomain Enumeration

被引:2
|
作者
Degani, Luca [1 ,2 ]
Bergadano, Francesco [3 ]
Mirheidari, Seyed Ali [1 ]
Martinelli, Fabio [2 ]
Crispo, Bruno [1 ]
机构
[1] Univ Trento, Trento, Italy
[2] CNR IIT, Pisa, Italy
[3] Univ Torino, Turin, Italy
来源
37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING | 2022年
关键词
generative adversarial networks; subdomain enumeration; subdomain takeover;
D O I
10.1145/3477314.3506967
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Subdomain enumeration is a fundamental step of many security processes (i.e., vulnerability discovery, OSINT, host enumeration, etc.). Up to now, this has been achieved with deterministic procedures that have shown some limitations. For instance, the process typically requires the generation of a candidate, which is subsequently checked for validity. While the validation is a straightforward procedure, the definition of an optimal candidate generation strategy is still an open problem. This paper presents a novel subdomain enumeration tool that allows the generation of high-quality subdomain candidates. We employ a Generative Adversarial Network (GAN) to sample unseen candidates from the distribution of valid subdomain names. The model learns this distribution from publicly available datasets. Moreover, by sampling from the trained model, we address the limitations of traditional algorithms. Our experiments were carried out against 15 domains and a ground truth of 1164 other targets. The 15 domains were carefully selected from bug bounty platforms to avoid terms of use violations. Several factors influenced the choices, including the popularity, the expected number of subdomains, and the available services. Our experiments aim to validate our approach by testing the performance increase in subdomain enumeration processes against the state-of-the-art. We benchmark our proposal in terms of candidates' validity and sample uniqueness. The results showed that, with our GAN, the performance of a traditional subdomain enumeration workflow increased by up to 61%. In addition, according to our ground truth experiments, the GAN was able to guess, on average, 32% of subdomains.
引用
收藏
页码:1636 / 1645
页数:10
相关论文
共 50 条
  • [1] Generative Adversarial Networks
    Goodfellow, Ian
    Pouget-Abadie, Jean
    Mirza, Mehdi
    Xu, Bing
    Warde-Farley, David
    Ozair, Sherjil
    Courville, Aaron
    Bengio, Yoshua
    COMMUNICATIONS OF THE ACM, 2020, 63 (11) : 139 - 144
  • [2] Exploring generative adversarial networks and adversarial training
    Sajeeda A.
    Hossain B.M.M.
    Int. J. Cogn. Comp. Eng., (78-89): : 78 - 89
  • [3] Steganographic Generative Adversarial Networks
    Volkhonskiy, Denis
    Nazarov, Ivan
    Burnaev, Evgeny
    TWELFTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2019), 2020, 11433
  • [4] Coevolution of Generative Adversarial Networks
    Costa, Victor
    Lourenco, Nuno
    Machado, Penousal
    APPLICATIONS OF EVOLUTIONARY COMPUTATION, EVOAPPLICATIONS 2019, 2019, 11454 : 473 - 487
  • [5] A survey of generative adversarial networks
    Zhu, Kongtao
    Liu, Xiwei
    Yang, Hongxue
    2018 CHINESE AUTOMATION CONGRESS (CAC), 2018, : 2768 - 2773
  • [6] Constrained Generative Adversarial Networks
    Chao, Xiaopeng
    Cao, Jiangzhong
    Lu, Yuqin
    Dai, Qingyun
    Liang, Shangsong
    IEEE ACCESS, 2021, 9 : 19208 - 19218
  • [7] Deconstructing Generative Adversarial Networks
    Zhu, Banghua
    Jiao, Jiantao
    Tse, David
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (11) : 7155 - 7179
  • [8] Triple Generative Adversarial Networks
    Li, Chongxuan
    Xu, Kun
    Zhu, Jun
    Liu, Jiashuo
    Zhang, Bo
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2022, 44 (12) : 9629 - 9640
  • [9] Evolutionary Generative Adversarial Networks
    Wang, Chaoyue
    Xu, Chang
    Yao, Xin
    Tao, Dacheng
    IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2019, 23 (06) : 921 - 934
  • [10] Spatial Evolutionary Generative Adversarial Networks
    Toutouh, Jamal
    Hemberg, Erik
    O'Reilly, Una-May
    PROCEEDINGS OF THE 2019 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE (GECCO'19), 2019, : 472 - 480