MD-MinerP: Interaction Profiling Bipartite Graph Mining for Malware-Control Domain Detection

Author:

Jeng Tzung-Han12ORCID,Chen Yi-Ming2ORCID,Chen Chien-Chih1ORCID,Huang Chuan-Chiang1ORCID

Affiliation:

1. Chunghwa Telecommunication Laboratories, Taoyuan, Taiwan

2. National Central University, Taoyuan, Taiwan

Abstract

Despite the efforts of information security experts, cybercrimes are still emerging at an alarming rate. Among the tools used by cybercriminals, malicious domains are indispensable and harm from the Internet has become a global problem. Malicious domains play an important role from SPAM and Cross-Site Scripting (XSS) threats to Botnet and Advanced Persistent Threat (APT) attacks at large scales. To ensure there is not a single point of failure or to prevent their detection and blocking, malware authors have employed domain generation algorithms (DGAs) and domain-flux techniques to generate a large number of domain names for malicious servers. As a result, malicious servers are difficult to detect and remove. Furthermore, the clues of cybercrime are stored in network traffic logs, but analyzing long-term big network traffic data is a challenge. To adapt the technology of cybercrimes and automatically detect unknown malicious threats, we previously proposed a system called MD-Miner. To improve its efficiency and accuracy, we propose the MD-MinerP here, which generates more features with identification capabilities in the feature extraction stage. Moreover, MD-MinerP adapts interaction profiling bipartite graphs instead of annotated bipartite graphs. The experimental results show that MD-MinerP has better area under curve (AUC) results and found new malicious domains that could not be recognized by other threat intelligence systems. The MD-MinerP exhibits both scalability and applicability, which has been experimentally validated on actual enterprise network traffic.

Publisher

Hindawi Limited

Subject

Computer Networks and Communications,Information Systems

Reference43 articles.

1. Impeding malware analysis using conditional code obfuscation;M. Sharif

2. CloudAV: N-version antivirus in the network cloud;J. Oberheide

3. On the detection and identification of botnets

4. Detecting botnet command and control channels in network traffic;G. Gu

5. BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection;G. Gu

Cited by 3 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Comparison of Interaction Profiling Bipartite Graph Mining and Graph Neural Network for Malware-Control Domain Detection;Proceedings of the 2024 International Conference on Information Technology, Data Science, and Optimization;2024-05-22

2. Malicious Blockchain Domain Detection Based on Heterogeneous Information Network;GLOBECOM 2022 - 2022 IEEE Global Communications Conference;2022-12-04

3. Analysis of College Course Scheduling Problem Based on Ant Colony Algorithm;Computational Intelligence and Neuroscience;2022-08-25

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3