DSpace logo

Please use this identifier to cite or link to this item: http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16085
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBhatia, Ashutosh-
dc.date.accessioned2024-10-14T10:54:14Z-
dc.date.available2024-10-14T10:54:14Z-
dc.date.issued2022-09-
dc.identifier.urihttps://www.inderscienceonline.com/doi/abs/10.1504/IJSN.2022.125512-
dc.identifier.urihttp://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16085-
dc.description.abstractBotnet is a network of hosts (bots) infected by a common malware and controlled by command and control (C&C) servers. Once the malware is found in an infected host, it is easy to get the domain of its C&C server and block it. To counter such detection, many malware families use probabilistic algorithms, known as domain generation algorithms (DGAs), to generate domain names for the C&C servers. In this paper, we propose a probabilistic approach to identify the domain names that are likely to be generated by malware using DGAs. The proposed solution is based on the hypothesis that the entropy of human-generated domain names should be lesser than the entropy of DGA generated domain names. Results show that the percentage of false negatives in the detection of DGA generated domain names using the proposed method is less than 29% across 39 DGA families considered by us in our experimentation.en_US
dc.language.isoenen_US
dc.publisherInder Scienceen_US
dc.subjectComputer Scienceen_US
dc.subjectDomain name systemen_US
dc.subjectDomain generations algorithmsen_US
dc.subjectBotnetsen_US
dc.subjectC&C serveren_US
dc.titleEntropy and likelihood-based detection of DGA generated domain names and their familiesen_US
dc.typeArticleen_US
Appears in Collections:Department of Computer Science and Information Systems

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.