Institute of Computer Science, Liupanshui Normal University, Liupanshui, Guizhou, China.
Guizhou Xinjie Qianxun Software Service Co., Ltd, Liupanshui, Guizhou, China.
PLoS One. 2023 Jan 27;18(1):e0279866. doi: 10.1371/journal.pone.0279866. eCollection 2023.
Network attacks using Command and Control (C&C) servers have increased significantly. To hide their C&C servers, attackers often use Domain Generation Algorithms (DGA), which automatically generate domain names for C&C servers. Researchers have constructed many unique feature sets and detected DGA domains through machine learning or deep learning models. However, due to the limited features contained in the domain name, the DGA detection results are limited. In order to overcome this problem, the domain name features, the Whois features and the N-gram features are extracted for DGA detection. To obtain the N-gram features, the domain name whitelist and blacklist substring feature sets are constructed. In addition, a deep learning model based on BiLSTM, Attention and CNN is constructed. Additionally, the Domain Center is constructed for fast classification of domain names. Multiple comparative experiment results prove that the proposed model not only gets the best Accuracy, Precision, Recall and F1, but also greatly reduces the detection time.
利用命令与控制 (C&C) 服务器的网络攻击显著增加。为了隐藏他们的 C&C 服务器,攻击者经常使用域名生成算法 (DGA),它会自动为 C&C 服务器生成域名。研究人员通过机器学习或深度学习模型构建了许多独特的特征集,并检测到了 DGA 域名。然而,由于域名中包含的特征有限,DGA 的检测结果也受到限制。为了克服这个问题,我们提取了域名特征、Whois 特征和 N-gram 特征来进行 DGA 检测。为了获取 N-gram 特征,构建了域名白名单和黑名单子字符串特征集。此外,还构建了基于 BiLSTM、注意力和 CNN 的深度学习模型。此外,还构建了域名中心,用于快速分类域名。多项对比实验结果证明,所提出的模型不仅获得了最佳的准确率、精度、召回率和 F1 值,而且大大缩短了检测时间。