A Machine Learning Framework for Domain Generation Algorithm-Based Malware Detection
Attackers usually use a command and control (C2) server to manipulate the communication. In order to perform an attack, threat actors often employ a domain generation algorithm (DGA), which can allow malware to communicate with C2 by generating a variety of network locations. Traditional malware con...
Main Authors: | Yi Li, Kaiqi Xiong, Tommy Chin, Chengbin Hu |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8631171/ |
Similar Items
-
A Superficial Analysis Approach for Identifying Malicious Domain Names Generated by DGA Malware
by: Akihiro Satoh, et al.
Published: (2020-01-01) -
A Word-Level Analytical Approach for Identifying Malicious Domain Names Caused by Dictionary-Based DGA Malware
by: Akihiro Satoh, et al.
Published: (2021-04-01) -
On the Effectiveness of Perturbations in Generating Evasive Malware Variants
by: Beomjin Jin, et al.
Published: (2023-01-01) -
Comparison of Supervised Machine Learning Algorithms for Malware Detection
by: Mohd Faris Mohd Fuzi, et al.
Published: (2023-09-01) -
Toward Optimal LSTM Neural Networks for Detecting Algorithmically Generated Domain Names
by: Jose Selvi, et al.
Published: (2021-01-01)