Entropy and likelihood-based detection of DGA generated domain names and their families

被引:1
|
作者
Bhatia A. [1 ]
Vishvakarma D.K. [2 ]
Kaushik R. [3 ]
Agrawal A. [1 ]
机构
[1] Department of Computer Science, BITS, Rajasthan, Pilani
[2] Center for Artificial Intelligence and Robotics (CAIR), DRDO, Karnataka, Bangalore
[3] Department of Electronics and Communication Engineering, Maulana Azad National Institute of Technology, Madhya Pradesh, Bhopal
关键词
botnets; C&C server; command and control servers; domain generations algorithms; domain name system;
D O I
10.1504/IJSN.2022.125512
中图分类号
学科分类号
摘要
Botnet is a network of hosts (bots) infected by a common malware and controlled by command and control (C&C) servers. Once the malware is found in an infected host, it is easy to get the domain of its C&C server and block it. To counter such detection, many malware families use probabilistic algorithms, known as domain generation algorithms (DGAs), to generate domain names for the C&C servers. In this paper, we propose a probabilistic approach to identify the domain names that are likely to be generated by malware using DGAs. The proposed solution is based on the hypothesis that the entropy of human-generated domain names should be lesser than the entropy of DGA generated domain names. Results show that the percentage of false negatives in the detection of DGA generated domain names using the proposed method is less than 29% across 39 DGA families considered by us in our experimentation. Copyright © 2022 Inderscience Enterprises Ltd.
引用
收藏
页码:147 / 192
页数:45
相关论文
共 50 条
  • [1] Detection of DGA-Generated Domain Names with TF-IDF
    Vranken, Harald
    Alizadeh, Hassan
    ELECTRONICS, 2022, 11 (03)
  • [2] Character Level based Detection of DGA Domain Names
    Yu, Bin
    Pan, Jie
    Hu, Jiaming
    Nascimento, Anderson
    De Cock, Martine
    2018 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2018,
  • [3] DOLPHIN: Phonics based Detection of DGA Domain Names
    Zhao, Dan
    Li, Hao
    Sun, Xiuwen
    Tang, Yazhe
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [4] An Approach for Identifying Malicious Domain Names Generated by Dictionary-Based DGA Bots
    Satoh, Akihiro
    Nakamura, Yutaka
    Fukuda, Yutaka
    Nobayashi, Daiki
    Ikenaga, Takeshi
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2021, E104D (05): : 669 - 672
  • [5] A Likelihood-Based Framework for Variant Calling and De Novo Mutation Detection in Families
    Li, Bingshan
    Chen, Wei
    Zhan, Xiaowei
    Busonero, Fabio
    Sanna, Serena
    Sidore, Carlo
    Cucca, Francesco
    Kang, Hyun M.
    Abecasis, Goncalo R.
    PLOS GENETICS, 2012, 8 (10):
  • [6] Detecting the DGA-Based Malicious Domain Names
    Zhang, Ying
    Zhang, Yongzheng
    Xiao, Jun
    TRUSTWORTHY COMPUTING AND SERVICES, 2014, 426 : 130 - 137
  • [7] A Superficial Analysis Approach for Identifying Malicious Domain Names Generated by DGA Malware
    Satoh, Akihiro
    Fukuda, Yutaka
    Hayashi, Toyohiro
    Kitagata, Gen
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2020, 1 (01): : 1837 - 1849
  • [8] Likelihood-Based Inference of B Cell Clonal Families
    Ralph, Duncan K.
    Matsen, Frederick A.
    PLOS COMPUTATIONAL BIOLOGY, 2016, 12 (10)
  • [9] N-Trans: Parallel Detection Algorithm for DGA Domain Names
    Yang, Cheng
    Lu, Tianliang
    Yan, Shangyi
    Zhang, Jianling
    Yu, Xingzhan
    FUTURE INTERNET, 2022, 14 (07)
  • [10] A hybrid DGA DefenseNet for detecting DGA domain names based on FastText and deep learning techniques
    Chen, Jiann-Liang
    Qiu, Jian-Fu
    Chen, Yu-Hung
    COMPUTERS & SECURITY, 2025, 150