Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference

Mohamed Nabeel, Issa M. Khalil, Bei Guan, Ting Yu

Research output: Contribution to journalArticlepeer-review

25 Citations (Scopus)

Abstract

Malicious domains, including phishing websites, spam servers, and command and control servers, are the reason for many of the cyber attacks nowadays. Thus, detecting them in a timely manner is important to not only identify cyber attacks but also take preventive measures. There has been a plethora of techniques proposed to detect malicious domains by analyzing Domain Name System (DNS) traffic data. Traditionally, DNS acts as an Internet miscreant's best friend, but we observe that the subtle traces in DNS logs left by such miscreants can be used against them to detect malicious domains. Our approach is to build a set of domain graphs by connecting "related"domains together and injecting known malicious and benign domains into these graphs so that we can make inferences about the other domains in the domain graphs. A key challenge in building these graphs is how to accurately identify related domains so that incorrect associations are minimized and the number of domains connected from the dataset is maximized. Based on our observations, we first train two classifiers and then devise a set of association rules that assist in linking domains together. We perform an in-depth empirical analysis of the graphs built using these association rules on passive DNS data and show that our techniques can detect many more malicious domains than the state-of-the-art.

Original languageEnglish
Article number3401897
JournalACM Transactions on Privacy and Security
Volume23
Issue number4
DOIs
Publication statusPublished - Aug 2020

Keywords

  • Malicious domains
  • domain association
  • graph inference
  • passive DNS

Fingerprint

Dive into the research topics of 'Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference'. Together they form a unique fingerprint.

Cite this