期刊文献+

基于Deep-IndRNN的DGA域名检测方法 被引量:1

DGA domain detection method based on Deep Independently Recurrent Neural Network
下载PDF
导出
摘要 恶意服务常利用域名生成算法(DGA)逃避域名检测,针对DGA域名隐蔽性强、现有检测方法检测速度较慢、实用性不强等问题,采用深度学习技术,提出了一种基于Deep-IndRNN的DGA域名检测方法。方法运用词袋模型(BoW)将域名向量化,然后通过Deep-IndRNN提取域名字符间特征,并使用Sigmoid函数对域名分类检测。其主要特点在于:通过将Deep-IndRNN的多序列输入拼接为单向量输入,以单步处理代替循环处理,同时结合Deep-IndRNN能保存更长时间记忆的特点,可有效释放深度学习时占用的GPU、CPU等系统资源,且在保证高准确率和精确度的前提下提高训练、检测速度。实验结果表明,基于Deep-IndRNN的DGA域名检测方法在检测任务中具有较高的准确率和精确度,相比于DNN、CNN、LSTM、BiLSTM、CNN-LSTM-Concat等同类检测方法,能显著提高训练、检测速度,是有效可行的。 Domain Generate Algorithm(DGA)was frequently used by malicious services to evade domain detection.In view of the strong concealment of DGA domain,the slow detection speed and the poor real-time performance in existing detection methods,a DGA domain detection method based on Deep Independently Recurrent Neural Network(Deep-IndRNN)was proposed by using deep learning.In this method,domain was firstly vectorized by using the Bag-of-Words(BoW)model.Also,the inter-character features of domain were extracted by using Deep-IndRNN.Furthermore,domain was classified and exported by using Sigmoid function.As the main characteristics of the method,a multi-sequence input of Deep-IndRNN was stitched into a single vector input,and cyclic processing was replaced by single-step processing.Meanwhile,combined with the characteristics of Deep-IndRNN which could save longer memory,it not only effectively released system resources such as GPU and CPU occupied by deep learning,but also greatly improved training and detection speed under the premise of ensuring higher accuracy and precision.Experimental results show that the DGA domain detection method based on Deep-IndRNN has high accuracy and precision in the detection task.Compared with similar detection methods,such as DNN,CNN,LSTM,BiLSTM and CNN-LSTM-Concat,the method proposed in this paper can significantly improve the training and detection speed,and is effective and feasible in practice.
作者 刘伯成 王浩宇 李向军 肖聚鑫 肖楚霁 孔珂 LIU Bocheng;WANG Haoyu;LI Xiangjun;XIAO Juxin;XIAO Chuji;KONG Ke(School of Software,Nanchang University,Nanchang 330047,China;Department of Computer Science and Technology,Nanchang University,Nanchang 330031,China)
出处 《南昌大学学报(理科版)》 CAS 北大核心 2020年第6期598-609,共12页 Journal of Nanchang University(Natural Science)
基金 国家自然科学基金项目(61862042,61762062) 江西省科技创新平台项目(20181BCD40005) 江西省主要学科学术和技术带头人项目(20172BCB22030) 江西省自然科学基金项目(20192BAB207019,20192BAB207020) 江西省重点研发计划项目(20192BBE50075,20181ACE50033) 江西省研究生创新基金项目(YC2019-S100,YC2019-S048) 江西省高校大学生实践创新训练计划项目(201910403041,2019040215,2020CX160) 江西省教改重点项目(JXJG-20-1-2)。
关键词 域名生成算法 深度学习 独立循环神经网络 SIGMOID函数 词袋模型 Domain Generate Algorithm(DGA) Deep learning Independently Recurrent Neural Network(IndRNN) Sigmoid function Bag-of-Words(BoW)model
  • 相关文献

参考文献8

二级参考文献74

  • 1刘飞飞,刘军万.数字图书馆中基于神经网络的汉语文本分析方法的研究[J].情报杂志,2005,24(5):74-76. 被引量:1
  • 2黄建红,汪庆年,章顺华,武和雷.基于小波包频带能量特征的包络分析在滚动轴承故障诊断中的应用[J].南昌大学学报(理科版),2006,30(4):402-405. 被引量:8
  • 3Porras P,Saidi H,Yegneswaran V, A foray into Conficker’s logic and rendezvous points. In: Lee W, ed. Proc. of the 2nd USENIX Conf. on Large-Scale Exploits and Emergent Threats: Botnets,Spyware, Worms, and More (LEET 2009). Boston: USENIX, 2009.
  • 4Conficker C Analysis. 2009. http://mtc.sri.com/Conficker/addendumC.
  • 5Royal P. Analysis of the Kraken Botnet. 2008. https://www.damballa.com/downloads/r_pubs/KrakenWhitepaper.pdf.
  • 6Stone-Gross B, Cova M,Cavallaro L. Your botnet is my botnet: analysis of a botnet takeover. In: Al-Shaer E, Jha S, Keromytis AD, eds. Proc. of the 16th ACM Conf. on Computer and Communications Security (CCS 2009). Chicago: ACM Press, 2009. 635-647. [doi: 10.1145/1653662.1653738].
  • 7Chatzis N, Popescu-Zeletin R. Flow level data mining of DNS query streams for email worm detection. In: Corchado E, Zunino R, Gastaldo P, Herrero A, eds. Proc. of the Int’l Workshop on Computational Intelligence in Security for Information Systems (CISIS2008). Berlin, Heidelberg: Springer-Verlag,2009. 186-194. [doi: 10.1007/978-3-540-88181-0—24].
  • 8Chatzis N, Popescu-Zeletin R. Detection of email worm-infected machines on the local name servers using time series analysis. Journal of Information Assurance and Security, 2009,4(3):292-300.
  • 9Chatzis N, Popescu-Zeletin R, Brownlee N. Email worm detection by wavelet analysis of DNS query streams. In: Dasgupta D, Zhan J, eds, Proc. of the IEEE Symp. on Computational Intelligence in Cyber Security (CICS 2009). Nashville: IEEE, 2009. 53-60. [doi: 10.1 丨 09/CICYBS.2009.4925090].
  • 10Chatzis N, Brownlee N. Similarity search over DNS query streams for email worm detection. In: A wan I,ed. Proc. of the 2009 Int,l Conf. on Advanced Information Networking and Applications (AINA 2009). Bradford: IEEE, 2009. 588-595. [doi: 10.1109/AINA. 2009.132].

共引文献65

同被引文献11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部