A Study of the Detection of Malicious Domain Name Generated by Dynamic Domain Name Generation Algorithm

碩士 === 元智大學 === 資訊管理學系 === 103 === In recent year, computer and mobile device are rapidly popular. However, these devices can be used to connect network. Attackers can use this characteristic to inject the malware for stealing privacy data. In order to achieve this goal, the connection of control-si...

Full description

Bibliographic Details
Main Authors: Yu-Feng Chu, 朱宇豐
Other Authors: Chien-Lung Chan
Format: Others
Language:zh-TW
Online Access:http://ndltd.ncl.edu.tw/handle/93873813448367056558
id ndltd-TW-103YZU05396055
record_format oai_dc
spelling ndltd-TW-103YZU053960552016-09-25T04:04:59Z http://ndltd.ncl.edu.tw/handle/93873813448367056558 A Study of the Detection of Malicious Domain Name Generated by Dynamic Domain Name Generation Algorithm 動態產生惡意域名偵測之研究 Yu-Feng Chu 朱宇豐 碩士 元智大學 資訊管理學系 103 In recent year, computer and mobile device are rapidly popular. However, these devices can be used to connect network. Attackers can use this characteristic to inject the malware for stealing privacy data. In order to achieve this goal, the connection of control-side becomes very important. In our study, we focus on a hiding technology for connection of control-side, which can dynamically generate the domain name to confuse the users. Moreover, this technology is too difficult to detect the source of connection of control-side. Our research outperforms previous approaches for the combination of entropy-based string and regular character domain name.However, the previous approaches are unable to detect low random strings and strings similar to the normal domain name. Therefore, we proposed a novel method to extract the features based on the domain name generated from malicious applications, each generation of malicious applications can get a domain name properties, in accordance with the cluster to train the probability model(Markov model), and to combine the normal domain name to jude, so that each markov model has a characteristic and better effect.The experiments proved the CONFICKER, CRYPTOLOCKER, MATSNU, OTHERS, PUSHDO, RAMDO, RAMNITPCAP, ROVNIX, TINBA, ZEUS malicious applications do not cluster of the status of the group can have a good detection results. But to produce the character combination similar to normal domain name by two malware(MATSNU,ROVNIX) are difficult to detect, in accordance with the characteristic value will can have a good effect, when the 13 cluster above 0.9 value up, that can detect more than 90% of dynamically generated domain name. Chien-Lung Chan 詹前隆 學位論文 ; thesis 87 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 元智大學 === 資訊管理學系 === 103 === In recent year, computer and mobile device are rapidly popular. However, these devices can be used to connect network. Attackers can use this characteristic to inject the malware for stealing privacy data. In order to achieve this goal, the connection of control-side becomes very important. In our study, we focus on a hiding technology for connection of control-side, which can dynamically generate the domain name to confuse the users. Moreover, this technology is too difficult to detect the source of connection of control-side. Our research outperforms previous approaches for the combination of entropy-based string and regular character domain name.However, the previous approaches are unable to detect low random strings and strings similar to the normal domain name. Therefore, we proposed a novel method to extract the features based on the domain name generated from malicious applications, each generation of malicious applications can get a domain name properties, in accordance with the cluster to train the probability model(Markov model), and to combine the normal domain name to jude, so that each markov model has a characteristic and better effect.The experiments proved the CONFICKER, CRYPTOLOCKER, MATSNU, OTHERS, PUSHDO, RAMDO, RAMNITPCAP, ROVNIX, TINBA, ZEUS malicious applications do not cluster of the status of the group can have a good detection results. But to produce the character combination similar to normal domain name by two malware(MATSNU,ROVNIX) are difficult to detect, in accordance with the characteristic value will can have a good effect, when the 13 cluster above 0.9 value up, that can detect more than 90% of dynamically generated domain name.
author2 Chien-Lung Chan
author_facet Chien-Lung Chan
Yu-Feng Chu
朱宇豐
author Yu-Feng Chu
朱宇豐
spellingShingle Yu-Feng Chu
朱宇豐
A Study of the Detection of Malicious Domain Name Generated by Dynamic Domain Name Generation Algorithm
author_sort Yu-Feng Chu
title A Study of the Detection of Malicious Domain Name Generated by Dynamic Domain Name Generation Algorithm
title_short A Study of the Detection of Malicious Domain Name Generated by Dynamic Domain Name Generation Algorithm
title_full A Study of the Detection of Malicious Domain Name Generated by Dynamic Domain Name Generation Algorithm
title_fullStr A Study of the Detection of Malicious Domain Name Generated by Dynamic Domain Name Generation Algorithm
title_full_unstemmed A Study of the Detection of Malicious Domain Name Generated by Dynamic Domain Name Generation Algorithm
title_sort study of the detection of malicious domain name generated by dynamic domain name generation algorithm
url http://ndltd.ncl.edu.tw/handle/93873813448367056558
work_keys_str_mv AT yufengchu astudyofthedetectionofmaliciousdomainnamegeneratedbydynamicdomainnamegenerationalgorithm
AT zhūyǔfēng astudyofthedetectionofmaliciousdomainnamegeneratedbydynamicdomainnamegenerationalgorithm
AT yufengchu dòngtàichǎnshēngèyìyùmíngzhēncèzhīyánjiū
AT zhūyǔfēng dòngtàichǎnshēngèyìyùmíngzhēncèzhīyánjiū
AT yufengchu studyofthedetectionofmaliciousdomainnamegeneratedbydynamicdomainnamegenerationalgorithm
AT zhūyǔfēng studyofthedetectionofmaliciousdomainnamegeneratedbydynamicdomainnamegenerationalgorithm
_version_ 1718385614413365248