Robust Botnet DGA Detection: Blending XAI and OSINT for Cyber Threat Intelligence Sharing
We investigated 12 years DNS query logs of our campus network and identified phenomena of malicious botnet domain generation algorithm (DGA) traffic. DGA-based botnets are difficult to detect using cyber threat intelligence (CTI) systems based on blocklists. Artificial intelligence (AI)/machine lear...
Main Authors: | Hatma Suryotrisongko, Yasuo Musashi, Akio Tsuneda, Kenichi Sugitani |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2022-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9743448/ |
Similar Items
-
DGA-based botnets detection using DNS traffic mining
by: Ahmed M. Manasrah, et al.
Published: (2022-05-01) -
Detection of DGA-Generated Domain Names with TF-IDF
by: Harald Vranken, et al.
Published: (2022-01-01) -
SHAP Interpretations of Tree and Neural Network DNS Classifiers for Analyzing DGA Family Characteristics
by: Nikos Kostopoulos, et al.
Published: (2023-01-01) -
Inline Detection of DGA Domains Using Side Information
by: Raaghavi Sivaguru, et al.
Published: (2020-01-01) -
Analysis of Botnet Domain Names for IoT Cybersecurity
by: Wanting Li, et al.
Published: (2019-01-01)