N-Trans: Parallel Detection Algorithm for DGA Domain Names

被引:7
|
作者
Yang, Cheng [1 ]
Lu, Tianliang [1 ]
Yan, Shangyi [1 ]
Zhang, Jianling [1 ]
Yu, Xingzhan [1 ]
机构
[1] Peoples Publ Secur Univ China, Coll Informat & Cyber Secur, Beijing 100038, Peoples R China
关键词
malicious domain name; DGA; parallel detection model; N-gram; Transformer model; N-Trans;
D O I
10.3390/fi14070209
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Domain name generation algorithms are widely used in malware, such as botnet binaries, to generate large sequences of domain names of which some are registered by cybercriminals. Accurate detection of malicious domains can effectively defend against cyber attacks. The detection of such malicious domain names by the use of traditional machine learning algorithms has been explored by many researchers, but still is not perfect. To further improve on this, we propose a novel parallel detection model named N-Trans that is based on the N-gram algorithm with the Transformer model. First, we add flag bits to the first and last positions of the domain name for the parallel combination of the N-gram algorithm and Transformer framework to detect a domain name. The model can effectively extract the letter combination features and capture the position features of letters in the domain name. It can capture features such as the first and last letters in the domain name and the position relationship between letters. In addition, it can accurately distinguish between legitimate and malicious domain names. In the experiment, the dataset is the legal domain name of Alexa and the malicious domain name collected by the 360 Security Lab. The experimental results show that the parallel detection model based on N-gram and Transformer achieves 96.97% accuracy for DGA malicious domain name detection. It can effectively and accurately identify malicious domain names and outperforms the mainstream malicious domain name detection algorithms.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Character Level based Detection of DGA Domain Names
    Yu, Bin
    Pan, Jie
    Hu, Jiaming
    Nascimento, Anderson
    De Cock, Martine
    2018 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2018,
  • [2] DOLPHIN: Phonics based Detection of DGA Domain Names
    Zhao, Dan
    Li, Hao
    Sun, Xiuwen
    Tang, Yazhe
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [3] Detection of DGA-Generated Domain Names with TF-IDF
    Vranken, Harald
    Alizadeh, Hassan
    ELECTRONICS, 2022, 11 (03)
  • [4] Integrating an Attention Mechanism and Deep Neural Network for Detection of DGA Domain Names
    Ren, Fangli
    Jiang, Zhengwei
    Liu, Jian
    2019 IEEE 31ST INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2019), 2019, : 848 - 855
  • [5] Mitigating False Positives in DGA Detection for Non-English Domain Names
    Lee, Huiju
    Kim, Huy Kang
    2024 54TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS-SUPPLEMENTAL VOLUME, DSN-S 2024, 2024, : 150 - 151
  • [6] Malicious Domain Names Detection Algorithm Based on N-Gram
    Zhao, Hong
    Chang, Zhaobin
    Bao, Guangbin
    Zeng, Xiangyan
    JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2019, 2019
  • [7] Entropy and likelihood-based detection of DGA generated domain names and their families
    Bhatia A.
    Vishvakarma D.K.
    Kaushik R.
    Agrawal A.
    International Journal of Security and Networks, 2022, 17 (03) : 147 - 192
  • [8] Estimating the Randomness of Domain Names for DGA Bot Callbacks
    Satoh, Akihiro
    Nakamura, Yutaka
    Nobayashi, Daiki
    Ikenaga, Takeshi
    IEEE COMMUNICATIONS LETTERS, 2018, 22 (07) : 1378 - 1381
  • [9] Applied Machine Learning in Recognition of DGA Domain Names
    Stampar, Miroslav
    Fertalj, Kresimir
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2022, 19 (01) : 205 - 227
  • [10] Detecting the DGA-Based Malicious Domain Names
    Zhang, Ying
    Zhang, Yongzheng
    Xiao, Jun
    TRUSTWORTHY COMPUTING AND SERVICES, 2014, 426 : 130 - 137