Paper
22 November 2022 A high-performance domain generation algorithm domain detection model
Qizhi Zhang, Qiming Yu, Yang Xiao, Ziyu Feng, MengWei Wu
Author Affiliations +
Proceedings Volume 12475, Second International Conference on Advanced Algorithms and Signal Image Processing (AASIP 2022); 124751T (2022) https://doi.org/10.1117/12.2659372
Event: Second International Conference on Advanced Algorithms and Signal Image Processing (AASIP 2022), 2022, Hulun Buir, China
Abstract
Domain Generation Algorithm (DGA) is an algorithm used by malware to generate a large number of domain names, or DGA domains, on a regular basis. This ancient but ever-active technique is the key weapon on which central structure botnets rely. In recent years, many botnets have adopted the DGA algorithm's domain transformation technique to evade detection and blocking, making it extremely difficult for security personnel to detect DGA domain names. In this article, we use the domain names of Alexa's top one million global websites as a white sample. For the DGA sample data, we take the open data of 360NetLab as the black sample to form the data set of this paper. We use 2-Gram model for feature extraction, and construct the DGA domain detection model based on the LightGBM algorithm. Experimental results show that the accuracy of our model is higher than 98%, and compared with the current common classification models, our model has better performance in both time and space.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Qizhi Zhang, Qiming Yu, Yang Xiao, Ziyu Feng, and MengWei Wu "A high-performance domain generation algorithm domain detection model", Proc. SPIE 12475, Second International Conference on Advanced Algorithms and Signal Image Processing (AASIP 2022), 124751T (22 November 2022); https://doi.org/10.1117/12.2659372
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Detection and tracking algorithms

Data modeling

Performance modeling

Statistical modeling

Feature extraction

Machine learning

Network security

Back to Top