Detecting DGA domains with recurrent neural networks and side information

作者: Slawomir Grzonkowski , Alejandro Mosquera , Andrew B. Gardner , Ryan R. Curtin , Alexey Kleymenov

DOI:

关键词: Recurrent neural networkMalwareTask (project management)Computer scienceBlocking (computing)Machine learningState (computer science)Domain (software engineering)Endpoint securityArtificial intelligence

摘要: Modern malware typically makes use of a domain generation algorithm (DGA) to avoid command and control domains or IPs being seized or sinkholed. This means that an infected …

参考文章(44)
Stefano Schiavoni, Federico Maggi, Lorenzo Cavallaro, Stefano Zanero, Phoenix: DGA-Based Botnet Tracking and Intelligence ∗ international conference on detection of intrusions and malware, and vulnerability assessment. pp. 192- 211 ,(2014) , 10.1007/978-3-319-08509-8_11
Sicheng Li, Chunpeng Wu, Hai Li, Boxun Li, Yu Wang, Qinru Qiu, FPGA Acceleration of Recurrent Neural Network Based Language Model field-programmable custom computing machines. pp. 111- 118 ,(2015) , 10.1109/FCCM.2015.50
Felix S. Leder, Peter Martini, NGBPA Next Generation BotNet Protocol Analysis information security conference. ,vol. 297, pp. 307- 317 ,(2009) , 10.1007/978-3-642-01244-0_27
Roberto Perdisci, David Dagon, Yacin Nadji, Manos Antonakakis, Nikolaos Vasiloglou, Wenke Lee, Saeed Abu-Nimeh, From throw-away traffic to bots: detecting the rise of DGA-based malware usenix security symposium. pp. 24- 24 ,(2012)
Yoshua Bengio, Tomas Mikolov, Razvan Pascanu, On the difficulty of training recurrent neural networks international conference on machine learning. pp. 1310- 1318 ,(2013)
Andrej Karpathy, Li Fei-Fei, Justin Johnson, Visualizing and Understanding Recurrent Networks arXiv: Learning. ,(2015)
Leyla Bilge, Engin Kirda, Christopher Kruegel, Marco Balduzzi, EXPOSURE : Finding malicious domains using passive DNS analysis network and distributed system security symposium. ,(2011)
Sandeep Yadav, Ashwath Kumar Krishna Reddy, A. L. Narasimha Reddy, Supranamaya Ranjan, Detecting algorithmically generated domain-flux attacks with DNS traffic analysis IEEE ACM Transactions on Networking. ,vol. 20, pp. 1663- 1677 ,(2012) , 10.1109/TNET.2012.2184552
CE Shennon, Warren Weaver, A mathematical theory of communication Bell System Technical Journal. ,vol. 27, pp. 379- 423 ,(1948) , 10.1002/J.1538-7305.1948.TB01338.X
Hermann Ney, Patrick Doetsch, Michal Kozielski, Fast and Robust Training of Recurrent Neural Networks for Offline Handwriting Recognition international conference on frontiers in handwriting recognition. pp. 279- 284 ,(2014) , 10.1109/ICFHR.2014.54