PUMD: a PU learning-based malicious domain detection framework

被引:0
|
作者
Zhaoshan Fan
Qing Wang
Haoran Jiao
Junrong Liu
Zelin Cui
Song Liu
Yuling Liu
机构
[1] Chinese Academy of Sciences,Institute of Information Engineering
[2] University of Chinese Academy of Sciences,School of Cyber Security
来源
关键词
Malicious domain detection; Insufficient credible label information; Class imbalance; Incompact distribution; PU learning;
D O I
暂无
中图分类号
学科分类号
摘要
Domain name system (DNS), as one of the most critical internet infrastructure, has been abused by various cyber attacks. Current malicious domain detection capabilities are limited by insufficient credible label information, severe class imbalance, and incompact distribution of domain samples in different malicious activities. This paper proposes a malicious domain detection framework named PUMD, which innovatively introduces Positive and Unlabeled (PU) learning solution to solve the problem of insufficient label information, adopts customized sample weight to improve the impact of class imbalance, and effectively constructs evidence features based on resource overlapping to reduce the intra-class distance of malicious samples. Besides, a feature selection strategy based on permutation importance and binning is proposed to screen the most informative detection features. Finally, we conduct experiments on the open source real DNS traffic dataset provided by QI-ANXIN Technology Group to evaluate the PUMD framework’s ability to capture potential command and control (C&C) domains for malicious activities. The experimental results prove that PUMD can achieve the best detection performance under different label frequencies and class imbalance ratios.
引用
收藏
相关论文
共 50 条
  • [31] Malicious Domain Detection Based on Self-supervised HGNNs with Contrastive Learning
    Li, Zhiping
    Yuan, Fangfang
    Cao, Cong
    Su, Majing
    Lu, Yuhai
    Liu, Yanbing
    ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING, ICANN 2023, PT III, 2023, 14256 : 62 - 73
  • [32] Malicious domain detection based on semi-supervised learning and parameter optimization
    Liao, Renjie
    Wang, Shuo
    IET COMMUNICATIONS, 2024, 18 (06) : 386 - 397
  • [33] Malicious Domain Detection with Machine Learning for Financial Systems
    Gulserliler, Egemen
    Ozgen, Burak
    Bahtiyar, Serif
    2024 7TH INTERNATIONAL BALKAN CONFERENCE ON COMMUNICATIONS AND NETWORKING, BALKANCOM, 2024, : 200 - 205
  • [34] A Unified Learning Approach for Malicious Domain Name Detection
    Wagan, Atif Ali
    Li, Qianmu
    Zaland, Zubair
    Marjan, Shah
    Bozdar, Dadan Khan
    Hussain, Aamir
    Mirza, Aamir Mehmood
    Baryalai, Mehmood
    AXIOMS, 2023, 12 (05)
  • [35] Deep Learning-Based Malicious Smart Contract and Intrusion Detection System for IoT Environment
    Shah, Harshit
    Shah, Dhruvil
    Jadav, Nilesh Kumar
    Gupta, Rajesh
    Tanwar, Sudeep
    Alfarraj, Osama
    Tolba, Amr
    Raboaca, Maria Simona
    Marina, Verdes
    MATHEMATICS, 2023, 11 (02)
  • [36] Deep learning-based malicious smart contract detection scheme for internet of things environment
    Gupta, Rajesh
    Patel, Mohil Maheshkumar
    Shukla, Arpit
    Tanwar, Sudeep
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 97
  • [37] Deep learning-based malicious smart contract detection scheme for internet of things environment
    Gupta, Rajesh
    Patel, Mohil Maheshkumar
    Shukla, Arpit
    Tanwar, Sudeep
    Computers and Electrical Engineering, 2022, 97
  • [38] Evaluating the Possibility of Evasion Attacks to Machine Learning-Based Models for Malicious PowerShell Detection
    Mezawa, Yuki
    Mimura, Mamoru
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2022, 2022, 13620 : 252 - 267
  • [39] Learning-Based Detection of Malicious Hosts by Analyzing Non-Existent DNS Responses
    Ahmed, Jawad
    Gharakheili, Hassan Habibi
    Sivaraman, Vijay
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 3411 - 3416
  • [40] Malicious Domain Detection Based on Traffic Similarity
    Hu, Jianping
    Wang, Yongyi
    Shi, Fan
    Xu, Chengxi
    2ND INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY, CII 2017, 2017, : 416 - 421