Detecting malware based on expired command-and-control traffic
In this article, we analyze the behavioral characteristics of domain name service queries produced by programs and then design an algorithm to detect malware with expired command-and-control domains based on the key feature of domain name service traffic, that is, repeatedly querying domain with a f...
Main Authors: | Futai Zou, Siyu Zhang, Linsen Li, Li Pan, Jianhua Li |
---|---|
Format: | Article |
Language: | English |
Published: |
SAGE Publishing
2017-07-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1177/1550147717720791 |
Similar Items
-
Detecting Malware Based on DNS Graph Mining
by: Futai Zou, et al.
Published: (2015-10-01) -
DNS Traffic Analysis for Network-based Malware Detection
by: Vu Hong, Linh
Published: (2012) -
Analysis and Characterization of IoT Malware Command and Control Communication
by: Đ. D. Jovanović, et al.
Published: (2020-12-01) -
FPGA Acceleration of CNNs-Based Malware Traffic Classification
by: Lin Zhang, et al.
Published: (2020-10-01) -
On-Device Detection of Repackaged Android Malware via Traffic Clustering
by: Gaofeng He, et al.
Published: (2020-01-01)