SwePub
Sök i LIBRIS databas

  Extended search

onr:"swepub:oai:DiVA.org:oru-91572"
 

Search: onr:"swepub:oai:DiVA.org:oru-91572" > Adversarial Defense :

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist

Adversarial Defense : DGA-Based Botnets and DNS Homographs Detection Through Integrated Deep Learning

Ravi, Vinayakumar (author)
Center for Artificial Intelligence, Prince Mohammad Bin Fahd University, Khobar, Saudi Arabia
Alazab, Mamoun (author)
College of Engineering, IT and Environment, Charles Darwin University, Darwin NT, Australia
Srinivasan, Sriram (author)
Center for Computational Engineering and Networking, Amrita School of Engineering, Coimbatore Amrita Vishwa Vidyapeetham, Coimbatore, India
show more...
Arunachalam, Ajay, 1985- (author)
Örebro universitet,Institutionen för naturvetenskap och teknik,MRO AASS
Soman, KP (author)
Center for Computational Engineering and Networking, Amrita School of Engineering, Coimbatore Amrita Vishwa Vidyapeetham, Coimbatore, India
show less...
 (creator_code:org_t)
IEEE, 2023
2023
English.
In: IEEE transactions on engineering management. - : IEEE. - 0018-9391 .- 1558-0040. ; 70:1, s. 249-266
  • Journal article (peer-reviewed)
Abstract Subject headings
Close  
  • Cybercriminals use domain generation algorithms (DGAs) to prevent their servers from being potentially blacklisted or shut down. Existing reverse engineering techniques for DGA detection is labor intensive, extremely time-consuming, prone to human errors, and have significant limitations. Hence, an automated real-time technique with a high detection rate is warranted in such applications. In this article, we present a novel technique to detect randomly generated domain names and domain name system (DNS) homograph attacks without the need for any reverse engineering or using nonexistent domain (NXDomain) inspection using deep learning. We provide an extensive evaluation of our model over four large, real-world, publicly available datasets. We further investigate the robustness of our model against three different adversarial attacks: DeepDGA, CharBot, and MaskDGA. Our evaluation demonstrates that our method is effectively able to identify DNS homograph attacks and DGAs and also is resilient to common evading cyberattacks. Promising results show that our approach provides a more effective detection rate with an accuracy of 0.99. Additionally, the performance of our model is compared against the most popular deep learning architectures. Our findings highlight the essential need for more robust detection models to counter adversarial learning.

Subject headings

NATURVETENSKAP  -- Data- och informationsvetenskap -- Datavetenskap (hsv//swe)
NATURAL SCIENCES  -- Computer and Information Sciences -- Computer Sciences (hsv//eng)

Keyword

Botnet
cybercrime
cyber security
deep learning (DL)
DNS attacks
domain generation algorithms (DGAs)
domain name system (DNS)
malware

Publication and Content Type

ref (subject category)
art (subject category)

Find in a library

To the university's database

  • 1 of 1
  • Previous record
  • Next record
  •    To hitlist

Search outside SwePub

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view