- 【Updated on May 12, 2025】 Integration of CiNii Dissertations and CiNii Books into CiNii Research
- Trial version of CiNii Research Knowledge Graph Search feature is available on CiNii Labs
- 【Updated on June 30, 2025】Suspension and deletion of data provided by Nikkei BP
- Regarding the recording of “Research Data” and “Evidence Data”
An Approach for Identifying Malicious Domain Names Automatically Generated by DGA Malware
Bibliographic Information
- Other Title
-
- DGAマルウェアにより自動生成された悪性ドメインの判別
Search this article
Description
Some of the most serious security threats facing computer networks involve malware. Many types of malware have DGAs (Domain Generation Algorithms) to avoid detection. A DGA is a mechanism for hiding the callback communications of malware by frequently changing the domain name of a C&C (Command-and-Control Server). In this paper, we attempt to detect the callback communications of DGA malware by superficially analyzing domain names. Our approach distinguishes between benign and malicious domains based on the meaning of their character string and does not require any prior knowledge about the DGAs. Our evaluation indicates high performance, with a recall of 0.9960 and a precision of 0.9029. By enabling one to swiftly address various malware, our approach contributes to dramatically improving network security.
Journal
-
- 情報処理学会論文誌
-
情報処理学会論文誌 62 (5), 1341-1349, 2021-05-15
dummy publisher
- Tweet
Details 詳細情報について
-
- CRID
- 1390853649853885824
-
- NII Article ID
- 170000184872
-
- NII Book ID
- AN00116647
-
- ISSN
- 18827764
-
- HANDLE
- 10228/0002000129
-
- Text Lang
- ja
-
- Article Type
- journal article
-
- Data Source
-
- JaLC
- IRDB
- CiNii Articles
- KAKEN