Detecting Malware Based on DNS Graph Mining
Malware remains a major threat to nowadays Internet. In this paper, we propose a DNS graph mining-based malware detection approach. A DNS graph is composed of DNS nodes, which represent server IPs, client IPs, and queried domain names in the process of DNS resolution. After the graph construction, w...
Main Authors: | Futai Zou, Siyu Zhang, Weixiong Rao, Ping Yi |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi - SAGE Publishing
2015-10-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1155/2015/102687 |
Similar Items
-
Detecting APT Malware Infections Based on Malicious DNS and Traffic Analysis
by: G. Zhao, et al.
Published: (2015-01-01) -
Detecting malware based on expired command-and-control traffic
by: Futai Zou, et al.
Published: (2017-07-01) -
A Comprehensive Study of DNS Operational Issues by Mining DNS Forums
by: Xianran Liao, et al.
Published: (2022-01-01) -
Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers
by: Roberto Alonso, et al.
Published: (2016-08-01) -
DGA-based botnets detection using DNS traffic mining
by: Ahmed M. Manasrah, et al.
Published: (2022-05-01)