基于字符级替换的DGA域名生成方法

DGA DOMAIN NAMES GENERATION METHOD BASED ON CHARACTER-LEVEL REPLACEMENT

  • 摘要: 现代僵尸网络广泛采用域名生成算法(Domain Generation Algorithms, DGAs),以生成大量随机域名,用于隐蔽命令和控制(Command and Control, C&C)通信。近年来,研究人员提出了许多基于机器学习的方法以检测DGA域名。然而,这些方法难以有效应对对抗攻击。提出一种基于字符级替换的DGA(CLR-DGA),它通过一定条件下的字符替换,以良性域名为基础生成对抗性域名,不需要了解DGA检测器即可回避检测。实验采用5种深度学习分类器,对包括CLR-DGA的6种DGA域名测试分类效果。实验结果表明,CLR-DGA生成的域名最难被分类器检测。

     

    Abstract: Domain generation algorithms (DGAs) are widely-used in modern botnets to generate a large number of domain names for covert command and control (C&C) communications. In recent years, researchers have proposed many machine learning-based approaches to detect DGA domains. Nevertheless, they are somewhat unavailable for adversarial attacks. This paper proposes a DGA based on character-level replacement (CLR-DGA) that utilizes character-level replacement under certain conditions to generate adversarial domains based on benign domain names without any knowledge about the DGA detector to evade detection. The experiment used five deep learning classifiers to test the classification effect of six type of DGA domain names, including CLR-DGA. Experimental results demonstrate that the domain names generated by CLR-DGA are the most difficult to be detected by the classifiers.

     

/

返回文章
返回