An Experimental Analysis of Classification Techniques for Domain Generating Algorithms (DGA) based Malicious Domains Detection

被引:0
作者
Rayhan, Md Maruf [1 ]
Ayub, Md Ahsan [2 ]
机构
[1] Amer Int Univ Bangladesh, Dept Comp Sci, Dhaka, Bangladesh
[2] Tennessee Technol Univ, Dept Comp Sci, Cookeville, TN USA
来源
2020 23RD INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (ICCIT 2020) | 2020年
关键词
Classification Techniques; Domain Generating Algorithm; Machine Learning; Malicious Domain Name;
D O I
10.1109/ICCIT51783.2020.9392701
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In modern days, there has been a significant surge of Domain Generating Algorithms (DGAs) based various types of cyber attacks executed by adversaries to facilitate covert server communication with the help of botnets. Such algorithms provide attackers a plethora of malicious domain names from which a subset of domain names are selected, and hence, common choices of defensive techniques, such as, blacklisting, reverse engineering, sinkholing, and preemptive registration of domains, become highly ineffective. In order to combat this dreadful situation, academia and industry based security researchers and network defenders in cyber realm have been utilizing machine learning based techniques to discover unseen malicious domain names. In our study, we present a unique experimental analysis of 13 state-of-the-art classification techniques to analyze the effectiveness of such classifiers on a large, diverse category of DGA produced malicious domain names' dataset having 80 different DGA families. We incorporate three text feature extraction methods, such as, unigram, bigram, and trigram, to explore the experimental findings to cover different aspects as well as report the performance results of each compiled machine learning model in terms of accuracy, precision score, recall score, and F-1 score. We illustrate all the built models' performances in a tabular view for the readers to best compare one model with another in a variety of experimental settings we design.
引用
收藏
页数:5
相关论文
共 41 条
  • [1] Akarsh S, 2019, INT CONF ADVAN COMPU, P666, DOI [10.1109/ICACCS.2019.8728544, 10.1109/icaccs.2019.8728544]
  • [2] DeepDGA: Adversarially-Tuned Domain Generation and Detection
    Anderson, Hyrum S.
    Woodbridge, Jonathan
    Filar, Bobby
    [J]. AISEC'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, 2016, : 13 - 21
  • [3] [Anonymous], 2020, MAJESTIC MILLION
  • [4] [Anonymous], 1998, LEARNING TEXT CATEGO
  • [5] ANTONAKAKIS M, 2012, USENIX SEC S, P491
  • [6] Arkok B., 2014, ARXIV PREPRINT ARXIV
  • [7] Model Evasion Attack on Intrusion Detection Systems using Adversarial Machine Learning
    Ayub, Md Ahsan
    Johnson, William A.
    Talbert, Douglas A.
    Siraj, Ambareen
    [J]. 2020 54TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2020, : 324 - 329
  • [8] Bishop Christopher M., 2006, Pattern Recognition and Machine Learning
  • [9] Bagging predictors
    Breiman, L
    [J]. MACHINE LEARNING, 1996, 24 (02) : 123 - 140
  • [10] Breiman L., 2001, RANDOM FORESTS, V45, P5, DOI DOI 10.1023/A:1010933404324