Improving DGA-Based Malicious Domain Classifiers for Malware Defense with Adversarial Machine Learning

01/02/2021
by   Ibrahim Yilmaz, et al.
0

Domain Generation Algorithms (DGAs) are used by adversaries to establish Command and Control (C&C) server communications during cyber attacks. Blacklists of known/identified C&C domains are often used as one of the defense mechanisms. However, since blacklists are static and generated by signature-based approaches, they can neither keep up nor detect never-seen-before malicious domain names. Due to this shortcoming of blacklist domain checking, machine learning algorithms have been used to address the problem to some extent. However, when training is performed with limited datasets, the algorithms are likely to fail in detecting new DGA variants. To mitigate this weakness, we successfully applied a DGA-based malicious domain classifier using the Long Short-Term Memory (LSTM) method with a novel feature engineering technique. Our model's performance shows a higher level of accuracy compared to a previously reported model from prior research. Additionally, we propose a new method using adversarial machine learning to generate never-before-seen malware-related domain families that can be used to illustrate the shortcomings of machine learning algorithms in this regard. Next, we augment the training dataset with new samples such that it makes training of the machine learning models more effective in detecting never-before-seen malicious domain name variants. Finally, to protect blacklists of malicious domain names from disclosure and tampering, we devise secure data containers that store blacklists and guarantee their protection against adversarial access and modifications.

READ FULL TEXT

page 1

page 8

research
04/20/2019

Can Machine Learning Model with Static Features be Fooled: an Adversarial Machine Learning Approach

The widespread adoption of smartphones dramatically increases the risk o...
research
03/12/2020

Inline Detection of DGA Domains Using Side Information

Malware applications typically use a command and control (C C) server ...
research
01/12/2023

Open SESAME: Fighting Botnets with Seed Reconstructions of Domain Generation Algorithms

An important aspect of many botnets is their capability to generate pseu...
research
03/28/2020

Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning

Botnets and malware continue to avoid detection by static rules engines ...
research
10/06/2016

DeepDGA: Adversarially-Tuned Domain Generation and Detection

Many malware families utilize domain generation algorithms (DGAs) to est...
research
11/02/2016

Predicting Domain Generation Algorithms with Long Short-Term Memory Networks

Various families of malware use domain generation algorithms (DGAs) to g...
research
08/26/2020

SIGL: Securing Software Installations Through Deep Graph Learning

Many users implicitly assume that software can only be exploited after i...

Please sign up or login with your details

Forgot password? Click here to reset