Down to earth! Guidelines for DGA-based Malware Detection

被引:0
|
作者
Cebere, Bogdan [1 ]
Flueren, Jonathan [1 ]
Sebastian, Silvia [1 ]
Plohmann, Daniel [2 ]
Rossow, Christian [1 ]
机构
[1] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
[2] Fraunhofer FKIE, Bonn, Germany
关键词
Machine Learning; Intrusion detection systems; Domain Generation Algorithms (DGAs); Meta-study; IN-LINE DETECTION; NEURAL-NETWORKS; BOTNET;
D O I
10.1145/3678890.3678913
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Successful malware campaigns rely on Command-and-Control (C2) infrastructure, enabling attackers to extract sensitive data and give instructions to bots. As a resilient mechanism to obtain C2 endpoints, attackers can employ Domain Generation Algorithms (DGAs), which automatically generate C2 domains instead of relying on static ones. Thus, researchers have proposed network-level detection approaches that reveal DGA usage by differentiating between non-DGA and generated domains. Recent approaches train machine learning (ML) models to recognize DGA domains using pattern recognition at the domain's character level. In this paper, we review network-level DGA detection from a meta-perspective. In particular, we survey 38 DGA detection papers in light of nine popular assumptions that are critical for the approaches to be practical. The assumptions range from foundational ones to assumptions about experiments and deployment of the detection systems. We then revisit if these assumptions hold, showing that most DGA detection approaches operate on a fragile basis. To prevent these issues in the future, we describe the technical security concepts underlying each assumption and indicate best practices for obtaining more reliable results.
引用
收藏
页码:147 / 165
页数:19
相关论文
共 50 条
  • [41] Guidelines for Stego/Malware Detection Tools: Achieving GDPR Compliance
    Pawlicka, Aleksandra
    Jaroszewska-Choras, Dagmara
    Choras, Michal
    Pawlicki, Marek
    IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2020, 39 (04) : 60 - 70
  • [42] Character Level based Detection of DGA Domain Names
    Yu, Bin
    Pan, Jie
    Hu, Jiaming
    Nascimento, Anderson
    De Cock, Martine
    2018 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2018,
  • [43] Pontus: A Linguistics-based DGA Detection System
    Yan, Dingkui
    Zhang, Huilin
    Wang, Yipeng
    Zang, Tianning
    Xu, Xiaolin
    Zeng, Yuwei
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [44] Detection of DGA Domains Based on Support Vector Machine
    Chen, Yu
    Yan, Sheng
    Pang, Tianyu
    Chen, Rui
    2018 THIRD INTERNATIONAL CONFERENCE ON SECURITY OF SMART CITIES, INDUSTRIAL CONTROL SYSTEM AND COMMUNICATIONS (SSIC), 2018,
  • [45] DOLPHIN: Phonics based Detection of DGA Domain Names
    Zhao, Dan
    Li, Hao
    Sun, Xiuwen
    Tang, Yazhe
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [46] A Novel Detection Method for Word-Based DGA
    Yang, Luhui
    Liu, Guangjie
    Zhai, Jiangtao
    Dai, Yuewei
    Yan, Zhaozhi
    Zou, Yuguang
    Huang, Wenchao
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 472 - 483
  • [47] Frequency Based Metamorphic Malware Detection
    Carkaci, Necmettin
    Sogukpmar, Ibrahim
    2016 24TH SIGNAL PROCESSING AND COMMUNICATION APPLICATION CONFERENCE (SIU), 2016, : 421 - 424
  • [48] Malware Detection Based on Image Conversion
    Kuo, Wen-Chung
    Chen, Yu-Ting
    Huang, Yu-Chih
    Wang, Chun-Cheng
    2021 INTERNATIONAL CONFERENCE ON SECURITY AND INFORMATION TECHNOLOGIES WITH AI, INTERNET COMPUTING AND BIG-DATA APPLICATIONS, 2023, 314 : 180 - 190
  • [49] Image Visualization based Malware Detection
    Kancherla, Kesav
    Mukkamala, Srinivas
    2013 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN CYBER SECURITY (CICS), 2013, : 40 - 44
  • [50] Unknown malware detection based on IRP
    Zhang F.-Y.
    Qi D.-Y.
    Hu J.-L.
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2011, 39 (04): : 15 - 20