Down to earth! Guidelines for DGA-based Malware Detection

被引:0
|
作者
Cebere, Bogdan [1 ]
Flueren, Jonathan [1 ]
Sebastian, Silvia [1 ]
Plohmann, Daniel [2 ]
Rossow, Christian [1 ]
机构
[1] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
[2] Fraunhofer FKIE, Bonn, Germany
关键词
Machine Learning; Intrusion detection systems; Domain Generation Algorithms (DGAs); Meta-study; IN-LINE DETECTION; NEURAL-NETWORKS; BOTNET;
D O I
10.1145/3678890.3678913
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Successful malware campaigns rely on Command-and-Control (C2) infrastructure, enabling attackers to extract sensitive data and give instructions to bots. As a resilient mechanism to obtain C2 endpoints, attackers can employ Domain Generation Algorithms (DGAs), which automatically generate C2 domains instead of relying on static ones. Thus, researchers have proposed network-level detection approaches that reveal DGA usage by differentiating between non-DGA and generated domains. Recent approaches train machine learning (ML) models to recognize DGA domains using pattern recognition at the domain's character level. In this paper, we review network-level DGA detection from a meta-perspective. In particular, we survey 38 DGA detection papers in light of nine popular assumptions that are critical for the approaches to be practical. The assumptions range from foundational ones to assumptions about experiments and deployment of the detection systems. We then revisit if these assumptions hold, showing that most DGA detection approaches operate on a fragile basis. To prevent these issues in the future, we describe the technical security concepts underlying each assumption and indicate best practices for obtaining more reliable results.
引用
收藏
页码:147 / 165
页数:19
相关论文
共 50 条
  • [31] On the Impact of Heterogeneity on Federated Learning at the Edge with DGA Malware Detection
    Ma Viet Duc
    Nguyen Thanh Luan
    Nguyen Tien Tai
    Nguyen Pham Trung Hieu
    Nguyen Ngoc Minh
    Pham Trung Hieu
    Vu Hai
    Nguyen Huu Thanh
    ASIAN INTERNET ENGINEERING CONFERENCE, AINTEC 2024, 2024, : 10 - 17
  • [32] Using Auxiliary Inputs in Deep Learning Models for Detecting DGA-based Domain Names
    Ghosh, Indraneel
    Kumar, Subham
    Bhatia, Ashutosh
    Vishwakarma, Deepak Kumar
    35TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2021), 2021, : 391 - 396
  • [33] DeepD2V-Deep Learning and Domain Word Embeddings for DGA based Malware Detection
    Torrealba Aravena, Lucas
    Casas, Pedro
    Bustos-Jimenez, Javier
    Capdehourat, German
    Findrik, Mislav
    2024 IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING FOR COMMUNICATION AND NETWORKING, ICMLCN 2024, 2024, : 164 - 170
  • [34] A Novel Approach for Detecting DGA-Based Botnets in DNS Queries Using Machine Learning Techniques
    Soleymani, Ali
    Arabgol, Fatemeh
    JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2021, 2021 (2021)
  • [35] DGA-Based Fault Diagnosis Using Self-Organizing Neural Networks with Incremental Learning
    Liu, Siqi
    Xie, Zhiyuan
    Hu, Zhengwei
    ELECTRONICS, 2025, 14 (03):
  • [36] DGA-based approach for optimal design of active mass damper for nonlinear structures considering ground motion effect
    Mohebbi, Mohtasham
    Dabbagh, Hamed Rasouli
    Moradpour, Solmaz
    Shakeri, Kazem
    Tarbali, Karim
    SMART MATERIALS AND STRUCTURES, 2015, 24 (04)
  • [37] Automatic Detection of DGA-Enabled Malware Using SDN and Traffic Behavioral Modeling
    Ahmed, Jawad
    Gharakheili, Hassan Habibi
    Russell, Craig
    Sivaraman, Vijay
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (04): : 2922 - 2939
  • [38] A Machine Learning Framework for Studying Domain Generation Algorithm (DGA)-Based Malware
    Chin, Tommy
    Xiong, Kaiqi
    Hu, Chengbin
    Li, Yi
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 433 - 448
  • [39] DOWN TO EARTH LEAK DETECTION
    BOWEN, R
    WATER-ENGINEERING & MANAGEMENT, 1981, 128 (10): : 62 - &
  • [40] MALWARE DETECTION BASED ON ONTOLOGY
    Xia, Xiao-Ling
    Ding, Yu-Xin
    Jiang, Jing-Zhi
    Zeng, Rong
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS (ICMLC), VOL 1, 2017, : 21 - 26