A Word-Level Analytical Approach for Identifying Malicious Domain Names Caused by Dictionary-Based DGA Malware
Computer networks are facing serious threats from the emergence of malware with sophisticated DGAs (Domain Generation Algorithms). This type of DGA malware dynamically generates domain names by concatenating words from dictionaries for evading detection. In this paper, we propose an approach for ide...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-04-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/10/9/1039 |
id |
doaj-6ffbaa98c18c4cb7956dcaadedbdadf6 |
---|---|
record_format |
Article |
spelling |
doaj-6ffbaa98c18c4cb7956dcaadedbdadf62021-04-28T23:00:58ZengMDPI AGElectronics2079-92922021-04-01101039103910.3390/electronics10091039A Word-Level Analytical Approach for Identifying Malicious Domain Names Caused by Dictionary-Based DGA MalwareAkihiro Satoh0Yutaka Fukuda1Gen Kitagata2Yutaka Nakamura3Information Science and Technology Center, Kyushu Institute of Technology, Kitakyushu 804-8550, JapanInformation Science and Technology Center, Kyushu Institute of Technology, Kitakyushu 804-8550, JapanResearch Institute of Electrical Communication, Tohoku University, Sendai 980-8577, JapanInformation Science and Technology Center, Kyushu Institute of Technology, Kitakyushu 804-8550, JapanComputer networks are facing serious threats from the emergence of malware with sophisticated DGAs (Domain Generation Algorithms). This type of DGA malware dynamically generates domain names by concatenating words from dictionaries for evading detection. In this paper, we propose an approach for identifying the callback communications of such dictionary-based DGA malware by analyzing their domain names at the word level. This approach is based on the following observations: These malware families use their own dictionaries and algorithms to generate domain names, and accordingly, the word usages of malware-generated domains are distinctly different from those of human-generated domains. Our evaluation indicates that the proposed approach is capable of achieving accuracy, recall, and precision as high as 0.9989, 0.9977, and 0.9869, respectively, when used with labeled datasets. We also clarify the functional differences between our approach and other published methods via qualitative comparisons. Taken together, these results suggest that malware-infected machines can be identified and removed from networks using DNS queries for detected malicious domain names as triggers. Our approach contributes to dramatically improving network security by providing a technique to address various types of malware encroachment.https://www.mdpi.com/2079-9292/10/9/1039malware detectiondictionary-based domain generation algorithmdomain namenetwork security |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Akihiro Satoh Yutaka Fukuda Gen Kitagata Yutaka Nakamura |
spellingShingle |
Akihiro Satoh Yutaka Fukuda Gen Kitagata Yutaka Nakamura A Word-Level Analytical Approach for Identifying Malicious Domain Names Caused by Dictionary-Based DGA Malware Electronics malware detection dictionary-based domain generation algorithm domain name network security |
author_facet |
Akihiro Satoh Yutaka Fukuda Gen Kitagata Yutaka Nakamura |
author_sort |
Akihiro Satoh |
title |
A Word-Level Analytical Approach for Identifying Malicious Domain Names Caused by Dictionary-Based DGA Malware |
title_short |
A Word-Level Analytical Approach for Identifying Malicious Domain Names Caused by Dictionary-Based DGA Malware |
title_full |
A Word-Level Analytical Approach for Identifying Malicious Domain Names Caused by Dictionary-Based DGA Malware |
title_fullStr |
A Word-Level Analytical Approach for Identifying Malicious Domain Names Caused by Dictionary-Based DGA Malware |
title_full_unstemmed |
A Word-Level Analytical Approach for Identifying Malicious Domain Names Caused by Dictionary-Based DGA Malware |
title_sort |
word-level analytical approach for identifying malicious domain names caused by dictionary-based dga malware |
publisher |
MDPI AG |
series |
Electronics |
issn |
2079-9292 |
publishDate |
2021-04-01 |
description |
Computer networks are facing serious threats from the emergence of malware with sophisticated DGAs (Domain Generation Algorithms). This type of DGA malware dynamically generates domain names by concatenating words from dictionaries for evading detection. In this paper, we propose an approach for identifying the callback communications of such dictionary-based DGA malware by analyzing their domain names at the word level. This approach is based on the following observations: These malware families use their own dictionaries and algorithms to generate domain names, and accordingly, the word usages of malware-generated domains are distinctly different from those of human-generated domains. Our evaluation indicates that the proposed approach is capable of achieving accuracy, recall, and precision as high as 0.9989, 0.9977, and 0.9869, respectively, when used with labeled datasets. We also clarify the functional differences between our approach and other published methods via qualitative comparisons. Taken together, these results suggest that malware-infected machines can be identified and removed from networks using DNS queries for detected malicious domain names as triggers. Our approach contributes to dramatically improving network security by providing a technique to address various types of malware encroachment. |
topic |
malware detection dictionary-based domain generation algorithm domain name network security |
url |
https://www.mdpi.com/2079-9292/10/9/1039 |
work_keys_str_mv |
AT akihirosatoh awordlevelanalyticalapproachforidentifyingmaliciousdomainnamescausedbydictionarybaseddgamalware AT yutakafukuda awordlevelanalyticalapproachforidentifyingmaliciousdomainnamescausedbydictionarybaseddgamalware AT genkitagata awordlevelanalyticalapproachforidentifyingmaliciousdomainnamescausedbydictionarybaseddgamalware AT yutakanakamura awordlevelanalyticalapproachforidentifyingmaliciousdomainnamescausedbydictionarybaseddgamalware AT akihirosatoh wordlevelanalyticalapproachforidentifyingmaliciousdomainnamescausedbydictionarybaseddgamalware AT yutakafukuda wordlevelanalyticalapproachforidentifyingmaliciousdomainnamescausedbydictionarybaseddgamalware AT genkitagata wordlevelanalyticalapproachforidentifyingmaliciousdomainnamescausedbydictionarybaseddgamalware AT yutakanakamura wordlevelanalyticalapproachforidentifyingmaliciousdomainnamescausedbydictionarybaseddgamalware |
_version_ |
1721503037218881536 |