Detecting malware based on expired command-and-control traffic
In this article, we analyze the behavioral characteristics of domain name service queries produced by programs and then design an algorithm to detect malware with expired command-and-control domains based on the key feature of domain name service traffic, that is, repeatedly querying domain with a f...
Main Authors: | Futai Zou, Siyu Zhang, Linsen Li, Li Pan, Jianhua Li |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi - SAGE Publishing
2017-07-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1177/1550147717720791 |
Similar Items
-
Detecting Malware Based on DNS Graph Mining
by: Futai Zou, et al.
Published: (2015-10-01) -
Analysis and Characterization of IoT Malware Command and Control Communication
by: Đ. D. Jovanović, et al.
Published: (2020-12-01) -
Malware traffic detection based on type II fuzzy recognition
by: Weisha Zhang, et al.
Published: (2024-04-01) -
Malware command and control over social media: Towards the server-less infrastructure
by: Radunović Vladimir, et al.
Published: (2020-01-01) -
FPGA Acceleration of CNNs-Based Malware Traffic Classification
by: Lin Zhang, et al.
Published: (2020-10-01)