期刊文献+

基于ISSA-FLightGBM算法的恶意域名检测方法研究

Research on Malicious Domain Detection Basedon ISSA-FLightGBM Algorithm
下载PDF
导出
摘要 针对基于机器学习的恶意域名检测效率低、模型难以优化的问题,提出一种基于改进麻雀搜索算法(Improved Sparrow Search Algorithm,ISSA)优化焦点轻量级梯度提升机(Focal Loss LightGBM,FLightGBM)的恶意域名检测模型.首先,应用Tent混沌映射与螺旋曲线策略改进麻雀搜索算法,改善算法优化能力不足的问题;其次,针对样本分类不均问题,将焦点损失函数引入LightGBM算法,构建FLightGBM算法的分类模型,并使用ISSA进行模型参数优化;最后,收集真实互联网中域名信息构建样本库,提取多种域名特征后构建数据特征库,通过对比多种分类模型识别精度等指标评判算法性能.结果表明,本文模型能更高效地检测恶意域名. Aiming at the problem of low efficiency and difficult optimization of malicious domain name detection model based on machine learning,this paper proposes a malicious domain name detection model based on Improved Sparrow Search Algorithm(ISSA)optimized Focal Loss Light Gradient Boosting Machine(FLightGBM).Firstly,the Tent chaos mapping and spiral curve strategy are used to improve the sparrow search algorithm to solve the problem of insufficient optimization ability.Secondly,to solve the problem of uneven sample classification,the focus loss function is introduced into LightGBM algorithm to build the classification model of LightGBM algorithm,and ISSA is used to optimize the model parameters.Finally,the domain name information in the real Internet is collected to build a sample database,and a variety of domain name features are extracted to build a data feature database.The performance of the algorithm is evaluated by comparing the recognition accuracy of various classification models.The results show that the proposed model can detect malicious domain names more efficiently.
作者 刘猛猛 LIU Meng-meng(College of Public Security Information Technology and Intelligence,Criminal Investigation Police University of China,Shenyang 110854,China)
出处 《兰州文理学院学报(自然科学版)》 2022年第6期46-51,共6页 Journal of Lanzhou University of Arts and Science(Natural Sciences)
基金 辽宁省教育厅科学研究经费项目(LJKZ0072) 中国刑事警察学院研究生创新能力提升项目(2021YCYB44)。
关键词 恶意域名 麻雀搜索算法 螺旋曲线 轻量级梯度提升机 焦点损失函数 malicious domain sparrow search algorithm spiral curve LightGBM focal loss
  • 相关文献

参考文献4

二级参考文献30

  • 1单梁,强浩,李军,王执铨.基于Tent映射的混沌优化算法[J].控制与决策,2005,20(2):179-182. 被引量:194
  • 2CNCERT/CC.2014中国互联网网络安全报告[EB/OL].[2015-08-15].http://www.cert.org.cn/publish/main/upload/File/2014%20secirity%20situation%20report.pdf.
  • 3BILGE L,KIRDA E,KRUEGEL C,et al.EXPOSURE:finding malicious domains using passive DNS analysis[EB/OL].[2015-07-06].http://seclab.ccs.neu.edu/static/publications/ndss2011dns.pdf.
  • 4ZHANG Y,HONG J I,CRANOR L F.Cantina:a content-based approach to detecting phishing Web sites[C]//Proceedings of the 2007 16th International Conference on World Wide Web.New York:ACM,2007:639-648.
  • 5WEIMER F.Passive DNS replication[EB/OL].[2015-07-06].http://www.first.org/conference/2005/papers/florian-weimer-paper-1.pdf.
  • 6PAN Y,DING X.Anomaly based Web phishing page detection[C]//Proceedings of the 22nd Annual Computer Security Applications Conference.Washington,DC:IEEE Computer Society,2006:381-392.
  • 7HOLZ T,GORECKI C,RIECK K,et al.Measuring and detecting fast-flux service networks[EB/OL].[2015-07-12].http://user.informatik.uni-goettingen.de/-krieck/docs/2008-ndss.pdf.
  • 8ZHOU C V,LECKIE C,KARUNASEKERA S,et al.A self-healing,self-protecting collaborative intrusion detection architecture to trace-back fast-flux phishing domains[C]//Proceedings of the 2008 IEEE Network Operations and Management Symposium Workshops.Piscataway,NJ:IEEE,2008:321-327.
  • 9BASNET R,MUKKAMALA S,SUNG A H.Detection of phishing attacks:a machine learning approach[M]//PRASAD B.Soft Computing Applications in Industry.Berlin:Springer,2008,226:373-383.
  • 10PASSERINI E,PALEARI R,MARTIGNONI L,et al.FluXOR:detecting and monitoring fast-flux service networks[M]//ZAMBONI D.Detection of Intrusions and Malware,and Vulnerability Assessment,LNCS 5137.Berlin:Springer,2008:186-206.

共引文献84

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部