Journal on Communications ›› 2016, Vol. 37 ›› Issue (10): 172-180.doi: 10.11959/j.issn.1000-436x.2016208
• Correspondences • Previous Articles Next Articles
Fu-xiang YUAN1,2,Fen-lin LIU1,2,Bin LU1,2,Dao-fu GONG1,2
Online:
2016-10-25
Published:
2016-10-25
Supported by:
Fu-xiang YUAN,Fen-lin LIU,Bin LU,Dao-fu GONG. Anomaly domains detection algorithm based on historical data[J]. Journal on Communications, 2016, 37(10): 172-180.
"
实验序号 | 测试集构成及样本数量 | 分类正确率 | |||||
测试集构成 | 合法样本/个 | 恶意样本/个 | 本文方法 | 文献[11]方法 | 文献[14]方法 | ||
9 | S1'、S2'、S3'、S4'、S5' | 2 000 | 2 000 | 89.8% | 97.8% | 99.5% | |
10 | S2'、S3'、S4'、S5' | 1 687 | 1 486 | 92.5% | 97.8% | 99.5% | |
11 | S2'、S3'、S4'、S5' | 1 687 | 1 486 | 95.7% | 97.8% | 99.5% | |
12 | S3'、S4'、S5' | 1 271 | 885 | 96.9% | 97.8% | 99.5% | |
13 | S3'、S4'、S5' | 1 271 | 885 | 98.1% | 97.8% | 99.5% | |
14 | S4'、S5' | 820 | 433 | 99.0% | 97.8% | 99.5% | |
15 | S4'、S5' | 820 | 433 | 99.6% | 97.8% | 99.5% | |
16 | S5' | 220 | 116 | 99.8% | 97.8% | 99.5% |
[1] | ROSSOW C , DIETRICH C , BOS H . Detection of intrusions and malware,and vulnerability assessment[M]. Berlin: SpringerPress, 2013. |
[2] | MAHMOUD M , NIR M , MATRAWY A . A survey on botnet architectures,detection and defences[J]. International Journal of Network Security, 2015,17(3): 272-289. |
[3] | PU Y , CHEN X , CUI X ,et al. Data stolen trojan detection based on network behaviors[J]. Procedia Computer Science, 2013,17: 828-835. |
[4] | NIRMAL K , JANET B , KUMAR R . Phishing-the threat that still exists[C]// International Conference on Computing and Communications Technologies(ICCCT). IEEE, 2015: 139-143. |
[5] | CHEN C M , CHENG S T , CHOU J H . Detection of fast-flux domains[J]. Journal of Advances in Computer Networks, 2013,1(2): 148-152. |
[6] | VANIA J , MENIYA A , JETHVA H B . A review on botnet and detection technique[J]. International Journal of Computer Trends and Technology, 2013,4(1): 23-29. |
[7] | KHATTAK S , RAMAY N R , KHAN K R ,et al. A taxonomy of botnet behavior,detection and defense[J]. Communications Surveys & Tutorials,IEEE, 2014,16(2): 898-924. |
[8] | GARCíA S , UHLí? V , REHAK M . Identifying and modeling botnet C&C behaviors[C]// The 1st International Workshop on Agents and CyberSecurity. ACM, 2014. |
[9] | YADAV S , REDDY A K K , REDDY A L ,et al. Detecting algorithmically generated malicious domain names[C]// The 10th ACM SIGCOMM Conference on Internet Measurement. Melbourne,Australia, 2010: 48-61. |
[10] | FELEGYHAZI M , KREIBICH C , PAXSON V . On the potential of proactive domain blacklisting[C]// The 3rd USENIX Conference on Large-Scale Exploits and Emergent Threats:Botnets,Spyware,Worms,and More. San Jose,CA,USA, 2010. |
[11] | 刘爱江, 黄长慧, 胡光俊 . 基于改进神经网络算法的木马控制域名检测方法[J]. 电信科学, 2014,30(7): 39-42. LIU A J , HUANG C H , HU G J . Detection method of trojan's control domain based on improved neural network algorithm[J]. Telecommunications Science, 2014,30(7): 39-42. |
[12] | ANTONAKAKIS M , PERDISCI R , DAGON D ,et al. Building a dynamic reputation system for DNS[C]// USENIX Security Symposium. Washington,DC,USA, 2010: 273-290. |
[13] | ANTONAKAKIS M , PERDISCI R , LEE W ,et al. Detecting malware domains at the upper DNS hierarchy[C]// USENIX Security Symposium. San Francisco,CA,USA, 2011: 23-46. |
[14] | BILGE L , SEN S , BALZAROTTI D ,et al. Exposure:a passive DNS analysis service to detect and report malicious domains[J]. ACM Transactions on Information and System Security (TISSEC), 2014,16(4): 14-41. |
[15] | 周勇林, 由林麟, 张永铮 . 基于命名及解析行为特征的异常域名检测方法[J]. 计算机工程与应用, 2011,47(20): 50-52. ZHOU Y L , YOU L L , ZHANG Y Z . Anomaly domain name detection method based on characteristics of name and resolution behavior[J]. Computer Engineering and Applications, 2011,47(20): 50-52. |
[16] | LENG Y , XU X , QI G . Combining active learning and semi-supervised learning to construct SVM classifier[J]. Knowledge-Based Systems, 2013,44: 121-131. |
[17] | YU B , SMITH L , THREEFOOT M . Machine learning and data mining in pattern recognition[M]. Berlin: SpringerPress, 2014. |
[1] | Yang GAO, Hongli ZHANG. Survey on community detection method based on random walk [J]. Journal on Communications, 2023, 44(6): 198-210. |
[2] | Jinzhi ZHENG, Ruyi JI, Libo ZHANG, Chen ZHAO. End-to-end scene text detection and recognition algorithm based on Transformer decoders [J]. Journal on Communications, 2023, 44(5): 64-78. |
[3] | Xin SUN, Guifu ZHANG, Hongyan XING, Wang Zenghui. Research on intrusion detection for maritime meteorological sensor network based on balancing generative adversarial network [J]. Journal on Communications, 2023, 44(4): 124-136. |
[4] | Qianyi DAI, Bin ZHANG, Song GUO, Kaiyong XU. Blockchain network layer anomaly traffic detection method based on multiple classifier integration [J]. Journal on Communications, 2023, 44(3): 66-80. |
[5] | Bingpeng ZHOU, Shanshan MA. Simultaneous vehicular location and velocity detection towards 6G integrated communication and sensing [J]. Journal on Communications, 2023, 44(3): 81-92. |
[6] | Feibo JIANG, Yubo PENG, Li DONG. Deep image semantic communication model for 6G [J]. Journal on Communications, 2023, 44(3): 198-208. |
[7] | Shuangyan YI, Yongsheng LIANG, Jingjing LU, Wei LIU, Tao HU, Zhenyu HE. Robust feature selection method via joint low-rank reconstruction and projection reconstruction [J]. Journal on Communications, 2023, 44(3): 209-219. |
[8] | Helin SUN, Hongyuan GAO, Yanan DU, Jianhua CHENG, Yapeng LIU. Joint estimation method of target number and orientation parameters for FDA-MIMO radar [J]. Journal on Communications, 2023, 44(2): 41-51. |
[9] | Weigang HUO, Rui LIANG, Yonghua LI. Anomaly detection model for multivariate time series based on stochastic Transformer [J]. Journal on Communications, 2023, 44(2): 94-103. |
[10] | Guojun LI, Cuiling XIANG, Changrong YE, Zunli WANG. Fast link-establishment method of integrated of communication and detection based on short-wave digital channelization [J]. Journal on Communications, 2023, 44(1): 89-102. |
[11] | Hongyu YANG, Haiyun YANG, Liang ZHANG, Xiang CHENG. Feature dependence graph based source code loophole detection method [J]. Journal on Communications, 2023, 44(1): 103-117. |
[12] | Yanhua LIU, Jiaqi LI, Zhengui OU, Xiaoling GAO, Ximeng LIU, Weizhi MENG, Baoxu LIU. Adversarial training driven malicious code detection enhancement method [J]. Journal on Communications, 2022, 43(9): 169-180. |
[13] | Chengsheng YUAN, Qiang GUO, Zhangjie FU. Copyright protection algorithm based on differential privacy deep fake fingerprint detection model [J]. Journal on Communications, 2022, 43(9): 181-193. |
[14] | Rui JIANG, Jun LI, Youyun XU, Xiaoming WANG, Dapeng LI. Fault tolerant GPS-AOA-SINS integrated navigation algorithm based on federated Kalman filter [J]. Journal on Communications, 2022, 43(8): 78-89. |
[15] | Weiyu CHEN, Junshan LUO, Fanggang WANG, Haiyang DING, Shilian WANG, Guojiang XIA. Survey of capacity limits and implementation techniques in wireless covert communication [J]. Journal on Communications, 2022, 43(8): 203-218. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|