Inline Detection of DGA Domains Using Side Information
Malware applications typically use a command and control (C&C) server to manage bots to perform malicious activities. Domain Generation Algorithms (DGAs) are popular methods for generating pseudo-random domain names that can be used to establish a communication between an infected bot and...
Main Authors: | Raaghavi Sivaguru, Jonathan Peck, Femi Olumofin, Anderson Nascimento, Martine De Cock |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9153925/ |
Similar Items
-
Detection of DGA-Generated Domain Names with TF-IDF
by: Harald Vranken, et al.
Published: (2022-01-01) -
Robust Botnet DGA Detection: Blending XAI and OSINT for Cyber Threat Intelligence Sharing
by: Hatma Suryotrisongko, et al.
Published: (2022-01-01) -
Private Enforcement for the DSA/DGA/DMA Package
by: Peter Picht -
DGA-based botnets detection using DNS traffic mining
by: Ahmed M. Manasrah, et al.
Published: (2022-05-01) -
DGA Domain Name Classification Method Based on Long Short-Term Memory with Attention Mechanism
by: Yanchen Qiao, et al.
Published: (2019-10-01)