Skip to main content
Top

2019 | OriginalPaper | Chapter

A Stacking Approach to Objectionable-Related Domain Names Identification by Passive DNS Traffic (Short Paper)

Authors : Chen Zhao, Yongzheng Zhang, Tianning Zang, Zhizhou Liang, Yipeng Wang

Published in: Collaborative Computing: Networking, Applications and Worksharing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Domain name classification is an important issue in the field of cyber security. Notice that objectionable-related domain names are one category of domain names that serve services such as gambling, pornography, etc. They are classified and even forbidden in some areas, some of these domain names may defraud visitors privacy and property. Timely and accurate identification of these domain names is significant for Internet content censorship and users security. In this work, we analyze the behavior of objectionable-related domain names from the real-world DNS traffic, finding that there exist evidently differences between objectionable-related domain names and none-objectionable ones. In this paper, we propose a stacking approach to objectionable-related domain names identification, VisSensor, that automatically extracts name features and latent visiting patterns of domain names from the DNS traffic and distinguishes objectionable-related ones. We integrate convolutional neural networks with fully-connected neural networks to collaborate features of different dimensions and improve experimental results. The accuracy of VisSensor is 88.48% with a false positive rate of \(9.11\%\). We also compared VisSensor with a public domain name tagging system, and our VisSensor performed better than the tagging system on the identification task of the objectionable-related domain names.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Weimer, F.: Passive DNS replication. In: FIRST Conference on Computer Security Incident, p. 98 (2005) Weimer, F.: Passive DNS replication. In: FIRST Conference on Computer Security Incident, p. 98 (2005)
4.
go back to reference Antonakakis, M., Perdisci, R., Dagon, D., et al.: Building a dynamic reputation system for DNS. In: USENIX Security Symposium, pp. 273–290 (2010) Antonakakis, M., Perdisci, R., Dagon, D., et al.: Building a dynamic reputation system for DNS. In: USENIX Security Symposium, pp. 273–290 (2010)
5.
go back to reference Bilge, L., Kirda, E., Kruegel, C., et al.: EXPOSURE: finding malicious domains using passive DNS analysis. In: NDSS (2011) Bilge, L., Kirda, E., Kruegel, C., et al.: EXPOSURE: finding malicious domains using passive DNS analysis. In: NDSS (2011)
6.
go back to reference Antonakakis, M., Perdisci, R., Lee, W., et al.: Detecting malware domains at the upper DNS hierarchy. In: USENIX Security Symposium, pp. 1–16 (2011) Antonakakis, M., Perdisci, R., Lee, W., et al.: Detecting malware domains at the upper DNS hierarchy. In: USENIX Security Symposium, pp. 1–16 (2011)
7.
go back to reference Rahbarinia, B., Perdisci, R., Antonakakis, M.: Segugio: efficient behavior-based tracking of malware-control domains in large ISP networks. In: 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN, pp. 403–414. IEEE (2015) Rahbarinia, B., Perdisci, R., Antonakakis, M.: Segugio: efficient behavior-based tracking of malware-control domains in large ISP networks. In: 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN, pp. 403–414. IEEE (2015)
8.
go back to reference Hao, S., Thomas, M., Paxson, V., et al.: Understanding the domain registration behavior of spammers. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 63–76. ACM (2013) Hao, S., Thomas, M., Paxson, V., et al.: Understanding the domain registration behavior of spammers. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 63–76. ACM (2013)
9.
go back to reference LeCun, Y., Jackel, L.D., Bottou, L., et al.: Learning algorithms for classification: a comparison on handwritten digit recognition. Neural Netw.: Stat. Mech. Perspect. 261, 276 (1995) LeCun, Y., Jackel, L.D., Bottou, L., et al.: Learning algorithms for classification: a comparison on handwritten digit recognition. Neural Netw.: Stat. Mech. Perspect. 261, 276 (1995)
10.
go back to reference Szegedy, C., Liu, W., Jia, Y., et al.: Going deeper with convolutions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1–9 (2015) Szegedy, C., Liu, W., Jia, Y., et al.: Going deeper with convolutions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1–9 (2015)
11.
go back to reference Sinha, S., Bailey, M., Jahanian, F.: Shades of Grey: on the effectiveness of reputation-based “blacklists”. In: 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008, pp. 57–64. IEEE (2008) Sinha, S., Bailey, M., Jahanian, F.: Shades of Grey: on the effectiveness of reputation-based “blacklists”. In: 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008, pp. 57–64. IEEE (2008)
12.
go back to reference Sheng, S., Wardman, B., Warner, G., et al.: An empirical analysis of phishing blacklists. In: Sixth Conference on Email and Anti-Spam, CEAS (2009) Sheng, S., Wardman, B., Warner, G., et al.: An empirical analysis of phishing blacklists. In: Sixth Conference on Email and Anti-Spam, CEAS (2009)
14.
go back to reference Kheir, N., Tran, F., Caron, P., Deschamps, N.: Mentor: positive DNS reputation to skim-off benign domains in botnet C&C blacklists. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T., et al. (eds.) SEC 2014. IFIPAICT, vol. 428, pp. 1–14. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-55415-5_1CrossRef Kheir, N., Tran, F., Caron, P., Deschamps, N.: Mentor: positive DNS reputation to skim-off benign domains in botnet C&C blacklists. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T., et al. (eds.) SEC 2014. IFIPAICT, vol. 428, pp. 1–14. Springer, Heidelberg (2014). https://​doi.​org/​10.​1007/​978-3-642-55415-5_​1CrossRef
15.
go back to reference Stevanovic, M., Pedersen, J.M., D’Alconzo, A., et al.: On the ground truth problem of malicious DNS traffic analysis. Comput. Secur. 55, 142–158 (2015)CrossRef Stevanovic, M., Pedersen, J.M., D’Alconzo, A., et al.: On the ground truth problem of malicious DNS traffic analysis. Comput. Secur. 55, 142–158 (2015)CrossRef
Metadata
Title
A Stacking Approach to Objectionable-Related Domain Names Identification by Passive DNS Traffic (Short Paper)
Authors
Chen Zhao
Yongzheng Zhang
Tianning Zang
Zhizhou Liang
Yipeng Wang
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-12981-1_20