Mining DNS for malicious domain registrations

27Citations
Citations of this article
43Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Millions of new domains are registered every day and the many of them are malicious. It is challenging to keep track of malicious domains by only Web content analysis due to the large number of domains. One interesting pattern in legitimate domain names is that many of them consist of English words or look like meaningful English while many malicious domain names are randomly generated and do not include meaningful words. We show that it is possible to transform this intuitive observation into statistically informative features using second order Markov models. Four transition matrices are built from known legitimate domain names, known malicious domain names, English words in a dictionary, and based on a uniform distribution. The probabilities from these Markov models, as well as other features extracted from DNS data, are used to build a Random Forest classifier. The experimental results demonstrate that our system can quickly catch malicious domains with a low false positive rate. © 2010 ICST.

Cite

CITATION STYLE

APA

He, Y., Zhong, Z., Krasser, S., & Tang, Y. (2010). Mining DNS for malicious domain registrations. In Proceedings of the 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2010. IEEE Computer Society. https://doi.org/10.4108/icst.collaboratecom.2010.5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free