Journal on Communications ›› 2016, Vol. 37 ›› Issue (3): 165-174.doi: 10.11959/j.issn.1000-436x.2016064
• Academic paper • Previous Articles Next Articles
Chang-ling ZHOU1,2,Xing-long LUAN1,2,Jian-guo XIAO3
Online:
2016-03-25
Published:
2017-08-04
Supported by:
Chang-ling ZHOU,Xing-long LUAN,Jian-guo XIAO. Vector space embedding of DNS query behaviors by deep learning[J]. Journal on Communications, 2016, 37(3): 165-174.
[1] | MOGHADDAM S , HELMY A . Spatio-temporal modeling of wireless users Internet access patterns using self-organizing maps[C]// 2011 Proceedings IEEE INFOCOM. c2011:496-500. |
[2] | CAGLAYAN A , TOOTHAKER M , DRAPAEAU D , et al. Behavioral analysis of fast flux service networks[C]// 2010 43rd Hawaii Interna-tional Conference on System Sciences. c2009:1-9. |
[3] | BILGE L , KIRDA E , KRUEGEL C , et al. EXPOSURE:finding mali-cious domains using passive DNS analysis[C]// NDSS. c2011:1-17. |
[4] | ANTONAKAKIS M , PERDISCI R . From throw-away traffic to bots:detecting the rise of DGA-based malware[C]// The 21st USENIX Se-curity Symposium. c2012:24. |
[5] | CHOI H , LEE H , LEE H , et al. Botnet detection by monitoring group activities in DNS traffic[C]// 7th IEEE International Confe-rence on Computer and Information Technology(CIT 2007). c2007:715-720. |
[6] | CHEN Y , ANTONAKAKIS M . DNS noise:measuring the pervasive-ness of disposable domains in modern DNS traffic[C]// Dependable Systems and Networks (DSN),44th Annual IEEE/IFIP International Conference on. c2014:598-609. |
[7] | CALLAHAN T , ALLMAN M , RABINOVICH M . On modern DNS behavior and properties[J]. ACM SIGCOMM Computer Commu ica-tion Review, 2013,43(3): 7. |
[8] | MIKOLOV T , CHEN K , CORRADO G , et al. Efficient estimation of word representations in vector space[J]. arXiv Preprint arXiv.1301.3781.20B. |
[9] | WIKIPEDIA. Embedding[EB/OL]. , 2015. |
[10] | HINTON G E . Learning distributed representations of concepts[C]// The Eighth Annual Conference of the Cognitive Science Society. c1986:1-12. |
[11] | LECUN Y , BENGIO Y , HINTON G . Deep learning[J]. Nature, 2015,521(7553): 436-444. |
[12] | REHUREK R . Word2vec in python,part two:optimizing.[EB/OL]. , 2015. |
[13] | MIKOLOV T , SUTSKEVER I , CHEN K , et al. Distributed represen-tations of words and phrases and their compositionality[C]// Advances in Neural Information Processing Systems. c2013:3111-3119. |
[14] | MAATEN L V D , HINTON G . Visualizing data using t-SNE[J]. Journal of Machine Learning Research, 2008,9:2579-2605. |
[15] | JAIN A , MURTY M , FLYNN P . Data clustering:a review[J]. ACM Computing Surveys(CSUR), 1999,31(3): 264-323. |
[16] | WIKIPEDIA. Complete-linkage clustering - wikipedia,the free en-cyclopedia[EB/OL]. , 2015. |
[17] | BRODER A , MITZENMACHER M . Network applications of bloom filters:a survey[J]. Internet Mathematics, 2004,1(4): 485-509. |
[18] | FJELLSKAL E B . Passive DNS tool.[EB/OL]. , 2015. |
[19] | 马云龙, 姜彩萍, 张千里 , 等. 基于IPFIX 的DNS异常行为检测方法[J]. 通信学报, 2014,35(z1): 5-9. MA Y L , JIANG C P , ZHANG Q L , et al. DNS abnormal behavior detec-tion based on IPFIX[J]. Journal on Communications, 2014,35(z1): 5-9. |
[20] | BOSTOCK M . Data driven documents.[EB/OL]. . |
[21] | GAO H , YEGNESWARAN V , CHEN Y , et al. An empirical reexami-nation of global DNS behavior[J]. ACM SIGCOMM Computer Com-munication Review, 2013,43(4): 267-278. |
[22] | CISCO. Cisco IOS NetFlow[EB/OL]. . |
[23] | WIKIPEDIA. Entropy (information theory)-wikipedia,the free encyc-lopedia[EB/OL]. . 2015. |
[24] | HERRMANN D , BANSE C , FEDERRATH H . Behaviorbased track-ing:exploiting characteristic patterns in DNS traffic[J]. Computers&Security, 2013,39:17-33. |
[25] | 袁春阳, 李青山, 王永建 . 基于行为与域名查询关联的僵尸网络聚类联动监测[J]. 计算机应用研究, 2012,29(3): 1084-1087. YUAN C Y , LI Q S , WANG Y J . Linkage monitoring of clus for botnet based on relevance of behavior and domain inqui y[J]. Applica-tion Research of Computers, 2012,29(3): 1084-1087. |
[26] | KRISHNAN S , TAYLOR T , MONROSE F , et al. Crossing the thre-shold:detecting network malfeasance via sequential hypothesis test-ing[C]// 2013 43rd Annual IEEE/IFIP International Conference on De-pendable Systems and Networks(DSN). c2013:1-12. |
[27] | ZOU W Y , SOCHER R , CER D , et al. Bilingual word embeddings for phrase-based machine translation[C]// 2013 Conference on Empirical Methods in Natural Language Processing(EMNLP 2013). c2013:1393-1398. |
[28] | LEVY O , GOLDBERG Y . Linguistic regularities in sparse and explicit word representations[C]// Proceedings of the 18th Conference on Computational Natural Language Learning(CoNLL 2014), c2014. |
[29] | WIKIPEDIA. Pointwise mutual information — Wikipedia,the free encyclopedia[EB/OL]. . |
[30] | PEROZZI B , SKIENA S . DeepWalk:online learning of social Re-presentations[C]// The 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. c2014:701-710. |
[31] | TANG J , QU M , WANG M , et al. LINE:Largescale Information Network Embedding[J]. arXiv preprint arXiv:1503.03578, 2015. |
[1] | Dongyu CHEN, Hua CHEN, Limin FAN, Yifang FU, Jian WANG. Research on test strategy for randomness based on deep learning [J]. Journal on Communications, 2023, 44(6): 23-33. |
[2] | Rongpeng LI, Bingyan WANG, Honggang ZHANG, Zhifeng ZHAO. Design of knowledge enhanced semantic communication receiver [J]. Journal on Communications, 2023, 44(6): 70-76. |
[3] | Shuai MA, Ke PEI, Huayan QI, Hang LI, Wen CAO, Hongmei WANG, Hailiang XIONG, Shiyin LI. Research on geomagnetic indoor high-precision positioning algorithm based on generative model [J]. Journal on Communications, 2023, 44(6): 211-222. |
[4] | Peng QIN, Haoting HE, Xiongwen ZHAO, Yang FU, Yu ZHANG, Miao WANG, Shuo WANG, Xue WU. Efficient resource allocation with context-awareness for parked car road side unit-based Internet of vehicles [J]. Journal on Communications, 2022, 43(7): 113-125. |
[5] | Jie YANG, Biao DONG, Xue FU, Yu WANG, Guan GUI. Lightweight decentralized learning-based automatic modulation classification method [J]. Journal on Communications, 2022, 43(7): 134-142. |
[6] | Xiuzhang YANG, Guojun PENG, Zichuan LI, Yangqi LYU, Side LIU, Chenguang LI. Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF [J]. Journal on Communications, 2022, 43(6): 58-70. |
[7] | Yong LIAO, Shiyi WANG. CSI feedback algorithm based on RM-Net for massive MIMO systems in high-speed mobile environment [J]. Journal on Communications, 2022, 43(5): 166-176. |
[8] | Yurong LIAO, Haining WANG, Cunbao LIN, Yang LI, Yuqiang FANG, Shuyan NI. Research progress of deep learning-based object detection of optical remote sensing image [J]. Journal on Communications, 2022, 43(5): 190-203. |
[9] | Zenghua ZHAO, Yuefan TONG, Jiayang CUI. Device-independent Wi-Fi fingerprinting indoor localization model based on domain adaptation [J]. Journal on Communications, 2022, 43(4): 143-153. |
[10] | Yong LIAO, Gang CHENG, Yujie LI. CSI feedback algorithm based on deep unfolding for massive MIMO systems [J]. Journal on Communications, 2022, 43(12): 77-88. |
[11] | Xueyuan DUAN, Yu FU, Kun WANG, Bin LI. LDoS attack detection method based on simple statistical features [J]. Journal on Communications, 2022, 43(11): 53-64. |
[12] | Junyan HUO, Ruipeng QIU, Yanzhuo MA, Fuzheng YANG. Reference frame list optimization algorithm in video coding by quality enhancement of the nearest picture [J]. Journal on Communications, 2022, 43(11): 136-147. |
[13] | Haiyan KANG, Yuanrui JI. Research on federated learning approach based on local differential privacy [J]. Journal on Communications, 2022, 43(10): 94-105. |
[14] | Hongxia ZHANG, Qi WANG, Dengyue WANG, Ben WANG. Honeypot contract detection of blockchain based on deep learning [J]. Journal on Communications, 2022, 43(1): 194-202. |
[15] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|