Classification of Malicious Domain Names using Support Vector Machine and Bi-gram Method

被引:0
作者
Davuth, Nhauo [1 ]
Kim, Sung-Ryul [2 ]
机构
[1] Konkuk Univ, Adv Technol Fusion Dept, Seoul, South Korea
[2] Konkuk Univ, Div Internet & Multimedia Engn, Seoul, South Korea
来源
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS | 2013年 / 7卷 / 01期
基金
新加坡国家研究基金会;
关键词
malware; botnet; support vector machine; Bi-gram;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Everyday there are millions of domains registered and some of them are related to malicious activities. Recently, domain names have been used to operate malicious networks such as botnet and other types of malicious software (malware). Studies have revealed that it was challenging to keep track of malicious domains by Web content analysis or human observation because of the large number of domains. Legitimate domain names usually consist of English words or other meaningful sequences and can be easy to understand by humans, while malicious domains are generated randomly and do not include meaningful words or are not otherwise readable. Recently, a classification method has been proposed to classify malicious domain names. They used many features from DNS queries, including some textual features. However, it seems difficult to collect and maintain those data. Our contribution is that, by using only domain names we could achieve better classification results, thus showing that domain names themselves contain enough information for classification.
引用
收藏
页码:51 / 58
页数:8
相关论文
共 14 条
[1]  
[Anonymous], 2010, INTERNET WIDE VIEW I
[2]  
Banday M. T., 2009, STUDY BOTNETS THEIR
[3]  
Buscher A., 2012, RACKING DDOS ATTACKS
[4]  
Incognito Software Inc, 2007, UND DNS DOM NAM SYST
[5]  
Joachims T., 1999, ADV KERNEL METHODS S
[6]  
Ma J., 2009, SIGKDD C PAR FRANC
[7]  
Mukherjee A., 2012, INT WORLD WID WEB C
[8]  
Porras P., 2009, ANAL CONFICKERS LOGI
[9]  
Porras Phillip, 2009, CONFICKER C ANAL
[10]  
SOPHOS, 2012, SOPHOS