Down to earth! Guidelines for DGA-based Malware Detection

被引:0
|
作者
Cebere, Bogdan [1 ]
Flueren, Jonathan [1 ]
Sebastian, Silvia [1 ]
Plohmann, Daniel [2 ]
Rossow, Christian [1 ]
机构
[1] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
[2] Fraunhofer FKIE, Bonn, Germany
关键词
Machine Learning; Intrusion detection systems; Domain Generation Algorithms (DGAs); Meta-study; IN-LINE DETECTION; NEURAL-NETWORKS; BOTNET;
D O I
10.1145/3678890.3678913
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Successful malware campaigns rely on Command-and-Control (C2) infrastructure, enabling attackers to extract sensitive data and give instructions to bots. As a resilient mechanism to obtain C2 endpoints, attackers can employ Domain Generation Algorithms (DGAs), which automatically generate C2 domains instead of relying on static ones. Thus, researchers have proposed network-level detection approaches that reveal DGA usage by differentiating between non-DGA and generated domains. Recent approaches train machine learning (ML) models to recognize DGA domains using pattern recognition at the domain's character level. In this paper, we review network-level DGA detection from a meta-perspective. In particular, we survey 38 DGA detection papers in light of nine popular assumptions that are critical for the approaches to be practical. The assumptions range from foundational ones to assumptions about experiments and deployment of the detection systems. We then revisit if these assumptions hold, showing that most DGA detection approaches operate on a fragile basis. To prevent these issues in the future, we describe the technical security concepts underlying each assumption and indicate best practices for obtaining more reliable results.
引用
收藏
页码:147 / 165
页数:19
相关论文
共 50 条
  • [1] Classification of DGA-Based Malware Using Deep Hybrid Learning
    Biru, Bereket Hailu
    Melese, Solomon Zemene
    PAN-AFRICAN CONFERENCE ON ARTIFICIAL INTELLIGENCE, PT II, PANAFRICON AI 2023, 2024, 2069 : 129 - 150
  • [2] Detection of DGA-based Malware Communications from DoH Traffic Using Machine Learning Analysis
    Mitsuhashi, Rikima
    Jin, Yong
    Iida, Katsuyoshi
    Shinagawa, Takahiro
    Takai, Yoshiaki
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [3] Early DGA-based botnet identification: pushing detection to the edges
    Zago, Mattia
    Gil Perez, Manuel
    Martinez Perez, Gregorio
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2021, 24 (03): : 1695 - 1710
  • [4] DGA-based botnets detection using DNS traffic mining
    Manasrah, Ahmed M.
    Khdour, Thair
    Freehat, Raeda
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (05) : 2045 - 2061
  • [5] DGA-Based Botnet Detection Toward Imbalanced Multiclass Learning
    Yijing Chen
    Bo Pang
    Guolin Shao
    Guozhu Wen
    Xingshu Chen
    TsinghuaScienceandTechnology, 2021, 26 (04) : 387 - 402
  • [6] Early DGA-based botnet identification: pushing detection to the edges
    Mattia Zago
    Manuel Gil Pérez
    Gregorio Martínez Pérez
    Cluster Computing, 2021, 24 : 1695 - 1710
  • [7] Identifying DGA-based botnets using network anomaly detection
    Gavrilut, Dragos Teodor
    Popoiu, George
    Benchea, Razvan
    PROCEEDINGS OF 2016 18TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC), 2016, : 292 - 299
  • [8] DGA-Based Botnet Detection Toward Imbalanced Multiclass Learning
    Chen, Yijing
    Pang, Bo
    Shao, Guolin
    Wen, Guozhu
    Chen, Xingshu
    TSINGHUA SCIENCE AND TECHNOLOGY, 2021, 26 (04) : 387 - 402
  • [9] CCGA: Clustering and Capturing Group Activities for DGA-based botnets detection
    Liu, Zhicheng
    Yun, Xiaochun
    Zhang, Yongzheng
    Wang, Yipeng
    2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 136 - 143
  • [10] Phoenix: DGA-Based Botnet Tracking and Intelligence
    Schiavoni, Stefano
    Maggi, Federico
    Cavallaro, Lorenzo
    Zanero, Stefano
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2014, 2014, 8550 : 192 - 211