计算机科学
人工智能
僵尸网络
机器学习
深度学习
特征工程
恶意软件
随机森林
分类器(UML)
水准点(测量)
人工神经网络
学习分类器系统
特征提取
互联网
操作系统
大地测量学
万维网
地理
作者
Jan Spooren,Davy Preuveneers,Lieven Desmet,Peter H. Janssen,Wouter Joosen
标识
DOI:10.1145/3297280.3297467
摘要
Malware typically uses Domain Generation Algorithms (DGAs) as a mechanism to contact their Command and Control server. In recent years, different approaches to automatically detect generated domain names have been proposed, based on machine learning. The first problem that we address is the difficulty to systematically compare these DGA detection algorithms due to the lack of an independent benchmark. The second problem that we investigate is the difficulty for an adversary to circumvent these classifiers when the machine learning models backing these DGA-detectors are known. In this paper we compare two different approaches on the same set of DGAs: classical machine learning using manually engineered features and a 'deep learning' recurrent neural network. We show that the deep learning approach performs consistently better on all of the tested DGAs, with an average classification accuracy of 98.7% versus 93.8% for the manually engineered features. We also show that one of the dangers of manual feature engineering is that DGAs can adapt their strategy, based on knowledge of the features used to detect them. To demonstrate this, we use the knowledge of the used feature set to design a new DGA which makes the random forest classifier powerless with a classification accuracy of 59.9%. The deep learning classifier is also (albeit less) affected, reducing its accuracy to 85.5%.
科研通智能强力驱动
Strongly Powered by AbleSci AI