Down to earth! Guidelines for DGA-based Malware Detection

被引:0
|
作者
Cebere, Bogdan [1 ]
Flueren, Jonathan [1 ]
Sebastian, Silvia [1 ]
Plohmann, Daniel [2 ]
Rossow, Christian [1 ]
机构
[1] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
[2] Fraunhofer FKIE, Bonn, Germany
关键词
Machine Learning; Intrusion detection systems; Domain Generation Algorithms (DGAs); Meta-study; IN-LINE DETECTION; NEURAL-NETWORKS; BOTNET;
D O I
10.1145/3678890.3678913
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Successful malware campaigns rely on Command-and-Control (C2) infrastructure, enabling attackers to extract sensitive data and give instructions to bots. As a resilient mechanism to obtain C2 endpoints, attackers can employ Domain Generation Algorithms (DGAs), which automatically generate C2 domains instead of relying on static ones. Thus, researchers have proposed network-level detection approaches that reveal DGA usage by differentiating between non-DGA and generated domains. Recent approaches train machine learning (ML) models to recognize DGA domains using pattern recognition at the domain's character level. In this paper, we review network-level DGA detection from a meta-perspective. In particular, we survey 38 DGA detection papers in light of nine popular assumptions that are critical for the approaches to be practical. The assumptions range from foundational ones to assumptions about experiments and deployment of the detection systems. We then revisit if these assumptions hold, showing that most DGA detection approaches operate on a fragile basis. To prevent these issues in the future, we describe the technical security concepts underlying each assumption and indicate best practices for obtaining more reliable results.
引用
收藏
页码:147 / 165
页数:19
相关论文
共 50 条
  • [11] DGA-based varrescheduling for transmission loss reduction
    Indian Institute of Technology, Delhi, India
    不详
    不详
    不详
    Int J Power Energy Syst, 2009, 4 (255-260):
  • [12] Detection and Blocking of DGA-based Bot Infected Computers by Monitoring NXDOMAIN Responses
    Iuchi, Yuki
    Jin, Yong
    Ichise, Hikaru
    Iida, Katsuyoshi
    Takai, Yoshiaki
    2020 7TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD 2020)/2020 6TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (EDGECOM 2020), 2020, : 82 - 87
  • [13] UMUDGA: A dataset for profiling DGA-based botnet
    Zago, Mattia
    Gil Perez, Manuel
    Martinez Perez, Gregorio
    COMPUTERS & SECURITY, 2020, 92
  • [14] Detecting the DGA-Based Malicious Domain Names
    Zhang, Ying
    Zhang, Yongzheng
    Xiao, Jun
    TRUSTWORTHY COMPUTING AND SERVICES, 2014, 426 : 130 - 137
  • [15] A Novel Approach for Detecting DGA-based Ransomwares
    Salehi, Saeid
    Shahriari, Hamid Reza
    Ahmadian, Mohammad Mehdi
    Tazik, Ladan
    2018 15TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2018,
  • [16] A Novel Reputation System to Detect DGA-Based Botnets
    Sharifnya, Reza
    Abadi, Mahdi
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE 2013), 2013, : 417 - 423
  • [17] Thwarting C2 Communication of DGA-Based Malware using Process-level DNS Traffic Tracking
    Menon, Anjali
    2019 7TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS), 2019,
  • [18] DGA-based Intrusion Detection System using Federated Learning Method on Edge Devices
    Nguyen Ngoc Minh
    Pham Trung Hieu
    Vu Hai
    Nguyen Huu Thanh
    38TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN 2024, 2024, : 509 - 514
  • [19] BotCensor: Detecting DGA-Based Botnet Using Two-Stage Anomaly Detection
    Biao Qi
    Jiang Jianguo
    Shi Zhixin
    Rui Mao
    Wang Qiwen
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 754 - 762
  • [20] Adversarial Defense: DGA-Based Botnets and DNS Homographs Detection Through Integrated Deep Learning
    Ravi, Vinayakumar
    Alazab, Mamoun
    Srinivasan, Sriram
    Arunachalam, Ajay
    Soman, K. P.
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2023, 70 (01) : 249 - 266