Enoch Agyepong
Detection of Algorithmically Generated Malicious Domain
Agyepong, Enoch; Buchanan, William; Jones, Kevin
Abstract
In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persistence presence on a compromised host. Amongst the various DDNS techniques, Domain Generation Algorithm (DGA) is often perceived as the most difficult to detect using traditional methods. This paper presents an approach for detecting DGA using frequency analysis of the character distribution and the weighted scores of the domain names. The approach's feasibility is demonstrated using a range of legitimate domains and a number of malicious algorithmically-generated domain names. Findings from this study show that domain names made up of English characters " a-z " achieving a weighted score of < 45 are often associated with DGA. When a weighted score of < 45 is applied to the Alexa one million list of domain names, only 15% of the domain names were treated as non-human generated.
Citation
Agyepong, E., Buchanan, W., & Jones, K. (2018, May). Detection of Algorithmically Generated Malicious Domain. Presented at Computer Science & Information Technology
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | Computer Science & Information Technology |
Start Date | May 26, 2018 |
End Date | May 27, 2018 |
Acceptance Date | Mar 1, 2018 |
Online Publication Date | Jul 2, 2018 |
Publication Date | May 26, 2018 |
Deposit Date | Jul 2, 2018 |
Pages | 13-32 |
Series ISSN | 2231-5403 |
Book Title | CS & IT-CSCP 2018 |
Chapter Number | 1 |
ISBN | 9781921987861 |
DOI | https://doi.org/10.5121/csit.2018.80802 |
Keywords | Domain Generated Algorithm; malicious domain names; Domain Name Frequency Analysis & malicious DNS |
Public URL | http://researchrepository.napier.ac.uk/Output/1239349 |
Publisher URL | http://acsit2018.org |
You might also like
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains
(2024)
Journal Article
An omnidirectional approach to touch-based continuous authentication
(2023)
Journal Article