论文标题

更少的是:恶意域检测的鲁棒和新颖特征

Less is More: Robust and Novel Features for Malicious Domain Detection

论文作者

Hajaj, Chen, Hason, Nitay, Harel, Nissim, Dvir, Amit

论文摘要

恶意领域越来越普遍,构成了严重的网络安全威胁。具体而言,许多类型的当前网络攻击都使用URL进行攻击通信(例如C \&C,网络钓鱼和矛捕捞)。尽管在检测这些攻击方面取得了持续的进展,但许多令人震惊的问题仍然开放,例如防御机制的弱点。由于机器学习已成为恶意软件检测最突出的方法之一,因此提出了一种强大的特征选择机制,该机制导致恶意域检测模型具有抵抗逃避攻击的模型。该机制基于经验数据表现出高性能。本文有两个主要的贡献:首先,它根据文献中广泛使用的功能提供了鲁棒特征选择的分析。请注意,即使特征集维空间降低了一半(从九个功能到四个功能),但分类器的性能仍得到改善(模型的F1分数从92.92 \%\%提高到95.81 \%)。其次,它介绍了针对对手的操纵的新颖功能。基于对不同特征集和常用分类模型的广泛评估,本文表明,基于强大特征的模型对恶意扰动具有抵抗力,同时对非操纵数据进行分类很有用。

Malicious domains are increasingly common and pose a severe cybersecurity threat. Specifically, many types of current cyber attacks use URLs for attack communications (e.g., C\&C, phishing, and spear-phishing). Despite the continuous progress in detecting these attacks, many alarming problems remain open, such as the weak spots of the defense mechanisms. Since machine learning has become one of the most prominent methods of malware detection, A robust feature selection mechanism is proposed that results in malicious domain detection models that are resistant to evasion attacks. This mechanism exhibits high performance based on empirical data. This paper makes two main contributions: First, it provides an analysis of robust feature selection based on widely used features in the literature. Note that even though the feature set dimensional space is reduced by half (from nine to four features), the performance of the classifier is still improved (an increase in the model's F1-score from 92.92\% to 95.81\%). Second, it introduces novel features that are robust to the adversary's manipulation. Based on an extensive evaluation of the different feature sets and commonly used classification models, this paper shows that models that are based on robust features are resistant to malicious perturbations, and at the same time useful for classifying non-manipulated data.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源