DSpace logo

Please use this identifier to cite or link to this item: http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16097
Title: Detection of Algorithmically Generated Domain Names using LSTM
Authors: Bhatia, Ashutosh
Keywords: Computer Science
Malware
Servers
Botnets
Recurrent neural networks
Issue Date: 2020
Publisher: IEEE
Abstract: A network of private computers forms a botnet when they are infected by malicious software and are commanded as a collection, without the owners of the computers being aware of it. Cybercriminals employ botnets for numerous malicious exercises like sending spam, thriving sensitive information, instigating Distributed Denial of Service (DDoS) attacks, etc. A Command and Control (CC) server gives instructions to the jeopardized machines for the execution of spiteful tasks. To evade disclosure, modern botnets like Cryptolocker, Zeus and Conficker use a method termed as Domain Fluxing or Domain Name Generation Algorithms (DGA), in which the infected bot sporadically generates and tries to fix a wide number of pseudorandom domain names till DNS server resolves one of them. In this work, we use Long Short-Term Memory (LSTM), a kind of Recurrent Neural Network (RNN) for the detection of DGAs by analyzing the alphanumeric features of the domain names. The experimental results show that we are able to identify the DGA family of a given domain name with high accuracy using the proposed scheme for most of the DGA families.
URI: https://ieeexplore.ieee.org/abstract/document/9027342
http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/16097
Appears in Collections:Department of Computer Science and Information Systems

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.