Detecting Malware Based on DNS Graph Mining

Malware remains a major threat to nowadays Internet. In this paper, we propose a DNS graph mining-based malware detection approach. A DNS graph is composed of DNS nodes, which represent server IPs, client IPs, and queried domain names in the process of DNS resolution. After the graph construction, w...

Full description

Bibliographic Details
Main Authors: Futai Zou, Siyu Zhang, Weixiong Rao, Ping Yi
Format: Article
Language:English
Published: Hindawi - SAGE Publishing 2015-10-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1155/2015/102687
_version_ 1797712101609832448
author Futai Zou
Siyu Zhang
Weixiong Rao
Ping Yi
author_facet Futai Zou
Siyu Zhang
Weixiong Rao
Ping Yi
author_sort Futai Zou
collection DOAJ
description Malware remains a major threat to nowadays Internet. In this paper, we propose a DNS graph mining-based malware detection approach. A DNS graph is composed of DNS nodes, which represent server IPs, client IPs, and queried domain names in the process of DNS resolution. After the graph construction, we next transform the problem of malware detection to the graph mining task of inferring graph nodes' reputation scores using the belief propagation algorithm. The nodes with lower reputation scores are inferred as those infected by malwares with higher probability. For demonstration, we evaluate the proposed malware detection approach with real-world dataset. Our real-world dataset is collected from campus DNS servers for three months and we built a DNS graph consisting of 19,340,820 vertices and 24,277,564 edges. On the graph, we achieve a true positive rate 80.63% with a false positive rate 0.023%. With a false positive of 1.20%, the true positive rate was improved to 95.66%. We detected 88,592 hosts infected by malware or C&C servers, accounting for the percentage of 5.47% among all hosts. Meanwhile, 117,971 domains are considered to be related to malicious activities, accounting for 1.5% among all domains. The results indicate that our method is efficient and effective in detecting malwares.
first_indexed 2024-03-12T07:16:49Z
format Article
id doaj.art-0ebfcfe0ac924ebe8dc8f38b5a5531c1
institution Directory Open Access Journal
issn 1550-1477
language English
last_indexed 2024-03-12T07:16:49Z
publishDate 2015-10-01
publisher Hindawi - SAGE Publishing
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj.art-0ebfcfe0ac924ebe8dc8f38b5a5531c12023-09-02T22:43:14ZengHindawi - SAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772015-10-011110.1155/2015/102687102687Detecting Malware Based on DNS Graph MiningFutai Zou0Siyu Zhang1Weixiong Rao2Ping Yi3 School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai 200240, China Network and Information Center, Shanghai Jiao Tong University, Shanghai 200240, China School of Software Engineering, Tongji University, Shanghai 201804, China School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai 200240, ChinaMalware remains a major threat to nowadays Internet. In this paper, we propose a DNS graph mining-based malware detection approach. A DNS graph is composed of DNS nodes, which represent server IPs, client IPs, and queried domain names in the process of DNS resolution. After the graph construction, we next transform the problem of malware detection to the graph mining task of inferring graph nodes' reputation scores using the belief propagation algorithm. The nodes with lower reputation scores are inferred as those infected by malwares with higher probability. For demonstration, we evaluate the proposed malware detection approach with real-world dataset. Our real-world dataset is collected from campus DNS servers for three months and we built a DNS graph consisting of 19,340,820 vertices and 24,277,564 edges. On the graph, we achieve a true positive rate 80.63% with a false positive rate 0.023%. With a false positive of 1.20%, the true positive rate was improved to 95.66%. We detected 88,592 hosts infected by malware or C&C servers, accounting for the percentage of 5.47% among all hosts. Meanwhile, 117,971 domains are considered to be related to malicious activities, accounting for 1.5% among all domains. The results indicate that our method is efficient and effective in detecting malwares.https://doi.org/10.1155/2015/102687
spellingShingle Futai Zou
Siyu Zhang
Weixiong Rao
Ping Yi
Detecting Malware Based on DNS Graph Mining
International Journal of Distributed Sensor Networks
title Detecting Malware Based on DNS Graph Mining
title_full Detecting Malware Based on DNS Graph Mining
title_fullStr Detecting Malware Based on DNS Graph Mining
title_full_unstemmed Detecting Malware Based on DNS Graph Mining
title_short Detecting Malware Based on DNS Graph Mining
title_sort detecting malware based on dns graph mining
url https://doi.org/10.1155/2015/102687
work_keys_str_mv AT futaizou detectingmalwarebasedondnsgraphmining
AT siyuzhang detectingmalwarebasedondnsgraphmining
AT weixiongrao detectingmalwarebasedondnsgraphmining
AT pingyi detectingmalwarebasedondnsgraphmining