论文标题

使用附带信息对DGA域检测

Inline Detection of DGA Domains Using Side Information

论文作者

Sivaguru, Raaghavi, Peck, Jonathan, Olumofin, Femi, Nascimento, Anderson, De Cock, Martine

论文摘要

恶意软件应用程序通常使用命令和控制服务器(C&C)服务器来管理机器人进行恶意活动。域生成算法(DGAS)是生成伪随机域名的流行方法,可用于在受感染的机器人和C&C服务器之间建立通信。近年来,基于机器的系统已被广泛用于检测DGA。文献中有几个众所周知的最先进的分类器,可以在具有高预测性能的实时应用中检测DGA域名。但是,这些DGA分类器非常容易受到对抗性攻击的影响,在这种攻击中,对手有目的地制作域名来逃避DGA检测分类器。在我们的工作中,我们专注于硬化DGA分类器与对抗攻击。为此,我们使用侧面信息来训练和评估最新的深度学习和随机森林(RF)分类器,使用侧面信息比对手更难操纵的侧面信息,而不是域名本身。此外,选择侧面信息功能,以便在实践中很容易获得它们以执行直列DGA检测。这些模型的性能和鲁棒性是通过将它们暴露于一天的交通数据以及对抗性攻击算法产生的域来评估的。我们发现,依赖域名和侧面信息的DGA分类器具有高性能,并且对对手更强大。

Malware applications typically use a command and control (C&C) server to manage bots to perform malicious activities. Domain Generation Algorithms (DGAs) are popular methods for generating pseudo-random domain names that can be used to establish a communication between an infected bot and the C&C server. In recent years, machine learning based systems have been widely used to detect DGAs. There are several well known state-of-the-art classifiers in the literature that can detect DGA domain names in real-time applications with high predictive performance. However, these DGA classifiers are highly vulnerable to adversarial attacks in which adversaries purposely craft domain names to evade DGA detection classifiers. In our work, we focus on hardening DGA classifiers against adversarial attacks. To this end, we train and evaluate state-of-the-art deep learning and random forest (RF) classifiers for DGA detection using side information that is harder for adversaries to manipulate than the domain name itself. Additionally, the side information features are selected such that they are easily obtainable in practice to perform inline DGA detection. The performance and robustness of these models is assessed by exposing them to one day of real-traffic data as well as domains generated by adversarial attack algorithms. We found that the DGA classifiers that rely on both the domain name and side information have high performance and are more robust against adversaries.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源