Journal of Information Security Reserach ›› 2022, Vol. 8 ›› Issue (2): 129-.

Previous Articles     Next Articles

An approach for detecting malicious domain names generated by dictionary-based DGA 

  

  • Online:2022-02-05 Published:2022-01-23

基于域名词间关系的字典型恶意域名检测方法

席一帆1,2 汪洋1,2 张钰1,2   

  1. 1(武汉邮电科学研究院 武汉 430074) 2( 南京烽火星空通信发展有限公司 南京 210000)
  • 通讯作者: 席一帆 硕士研究生,主要研究领域为网络安全。 ifanxi1998@gmail.com
  • 作者简介:席一帆 硕士研究生,主要研究领域为网络安全。 ifanxi1998@gmail.com 汪 洋 教授级高工。 ywang@njsecnet.com 张 钰 硕士研究生,主要研究领域为网络入侵检测。 825184275@qq.com

Abstract: A large number of botnets began to use dictionary-based domain generation algorithm(DGA) for command and control, making computer networks face more serious threats. Aiming at the problem that the malicious domain names generated by dictionary-based DGA has feature similar to the normal domain name, which make traditional detection method based on domain name character statistics and 2-gram model gradually invalid, a method to identify the dictionary-based malicious domain name based on the relationship between words that constitute the domain name string is proposed. Experimental results show that the Accuracy of the proposed method is 3.45% higher than that of the method based on domain character statistics and 2.84% higher than that of the 2-gram model for dictionary-based DGA family.

Key words: botnet, dictionary-based Domain Generation Algorithm, domain generation algorithm, relationship between words, network security

摘要: 大量僵尸网络开始采用字典型域名生成算法(Domain Generation Algorithm,DGA)进行命令与控制(C&C), 使得计算机网络面临愈加严重的威胁。针对字典型域名生成算法所生成的恶意域名具有与正常域名相似的字符特征,传统的基于域名字符统计特征与2-gram模型的检测方法逐渐失效的问题,提出一种基于构成域名字符串的单词的词间关系来识别字典型恶意域名的方法。实验结果表明,对于字典型恶意域名家族,该方法的F1 score值比基于域名字符统计特征的方法提升了3.45%,比2-gram模型提升了2.84%。

关键词: 僵尸网络, 字典型域名生成算法, 域名生成算法, 词间关系, 网络安全