Detecting the DGA-Based Malicious Domain Names

7Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

To achieve the goals of concealment and migration, some Bot Nets, such as Conficker, Srizbis and Torpig, use Domain Generation Algorithm (DGA) to produce a large number of random domain names dynamically. Then a small subset of these domain names would be selected for actual C&C. Compared with normal domain names, these domain names generated by DGA have significant difference in length, character frequency, etc. Current researches mainly use clustering-classification methods to Detect abnormal domain name. Some of them use NXDomain traffic clustering, other researches based on the classification of string features, such as the distribution of alphanumeric characters and bigram. In fact, domain name has strict hierarchy and each domain level has particular regularities. In this paper, the hierarchical characteristic is introduced into the detection process. We divide the domain name into distinct levels and calculate the characteristic value separately. In each level, we use entropy, bigram and length detections. Because of different efficiency in levels, we design the weigh for each level based on their efficiency. Finally, the level characteristic value of domain name is the weighted average value of levels. Our experiments show that the accuracy of the level-based method is higher than 94 %. © Springer-Verlag Berlin Heidelberg 2014.

Cite

CITATION STYLE

APA

Zhang, Y., Zhang, Y., & Xiao, J. (2014). Detecting the DGA-Based Malicious Domain Names. In Communications in Computer and Information Science (Vol. 426 CCIS, pp. 130–137). Springer Verlag. https://doi.org/10.1007/978-3-662-43908-1_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free