Cargando…
Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network
Malicious domains are critical resources in network security, behind which attackers hide malware to launch the malicious attacks. Therefore, blocking malicious domains is the most effective and practical way to combat and reduce hostile activities. There are three limitations in previous methods ov...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7304021/ http://dx.doi.org/10.1007/978-3-030-50420-5_28 |
_version_ | 1783548181740519424 |
---|---|
author | Liu, Zhicheng Li, Shuhao Zhang, Yongzheng Yun, Xiaochun Peng, Chengwei |
author_facet | Liu, Zhicheng Li, Shuhao Zhang, Yongzheng Yun, Xiaochun Peng, Chengwei |
author_sort | Liu, Zhicheng |
collection | PubMed |
description | Malicious domains are critical resources in network security, behind which attackers hide malware to launch the malicious attacks. Therefore, blocking malicious domains is the most effective and practical way to combat and reduce hostile activities. There are three limitations in previous methods over domain classification: (1) solely based on local domain features which tend to be not robust enough; (2) lack of a large number of ground truth for model-training to get high accuracy; (3) statically learning on graph which is not scalable. In this paper, we present Ringer, a scalable method to detect malicious domains by dynamic Graph Convolutional Network (GCN). Ringer first uses querying behaviors or domain-IP resolutions to construct domain graphs, on which the dynamic GCN is leveraged to learn the node representations that integrate both information about node features and graph structure. And then, these high-quality representations are further fed to the full-connected neural network for domain classification. Notably, instead of global statically learning, we adopt time-based hash to cut graphs to small ones and inductively learn the embedding of nodes according to selectively sampling neighbors. We construct a series of experiments on a large ISP over two days and compare it with state of the arts. The results demonstrate that Ringer achieves excellent performance with a high accuracy of 96.8% on average. Additionally, we find thousands of potential malicious domains by semi-supervised learning. |
format | Online Article Text |
id | pubmed-7304021 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
record_format | MEDLINE/PubMed |
spelling | pubmed-73040212020-06-19 Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network Liu, Zhicheng Li, Shuhao Zhang, Yongzheng Yun, Xiaochun Peng, Chengwei Computational Science – ICCS 2020 Article Malicious domains are critical resources in network security, behind which attackers hide malware to launch the malicious attacks. Therefore, blocking malicious domains is the most effective and practical way to combat and reduce hostile activities. There are three limitations in previous methods over domain classification: (1) solely based on local domain features which tend to be not robust enough; (2) lack of a large number of ground truth for model-training to get high accuracy; (3) statically learning on graph which is not scalable. In this paper, we present Ringer, a scalable method to detect malicious domains by dynamic Graph Convolutional Network (GCN). Ringer first uses querying behaviors or domain-IP resolutions to construct domain graphs, on which the dynamic GCN is leveraged to learn the node representations that integrate both information about node features and graph structure. And then, these high-quality representations are further fed to the full-connected neural network for domain classification. Notably, instead of global statically learning, we adopt time-based hash to cut graphs to small ones and inductively learn the embedding of nodes according to selectively sampling neighbors. We construct a series of experiments on a large ISP over two days and compare it with state of the arts. The results demonstrate that Ringer achieves excellent performance with a high accuracy of 96.8% on average. Additionally, we find thousands of potential malicious domains by semi-supervised learning. 2020-05-22 /pmc/articles/PMC7304021/ http://dx.doi.org/10.1007/978-3-030-50420-5_28 Text en © Springer Nature Switzerland AG 2020 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Article Liu, Zhicheng Li, Shuhao Zhang, Yongzheng Yun, Xiaochun Peng, Chengwei Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network |
title | Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network |
title_full | Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network |
title_fullStr | Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network |
title_full_unstemmed | Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network |
title_short | Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network |
title_sort | ringer: systematic mining of malicious domains by dynamic graph convolutional network |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7304021/ http://dx.doi.org/10.1007/978-3-030-50420-5_28 |
work_keys_str_mv | AT liuzhicheng ringersystematicminingofmaliciousdomainsbydynamicgraphconvolutionalnetwork AT lishuhao ringersystematicminingofmaliciousdomainsbydynamicgraphconvolutionalnetwork AT zhangyongzheng ringersystematicminingofmaliciousdomainsbydynamicgraphconvolutionalnetwork AT yunxiaochun ringersystematicminingofmaliciousdomainsbydynamicgraphconvolutionalnetwork AT pengchengwei ringersystematicminingofmaliciousdomainsbydynamicgraphconvolutionalnetwork |