Cargando…

Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network

Malicious domains are critical resources in network security, behind which attackers hide malware to launch the malicious attacks. Therefore, blocking malicious domains is the most effective and practical way to combat and reduce hostile activities. There are three limitations in previous methods ov...

Descripción completa

Detalles Bibliográficos
Autores principales: Liu, Zhicheng, Li, Shuhao, Zhang, Yongzheng, Yun, Xiaochun, Peng, Chengwei
Formato: Online Artículo Texto
Lenguaje:English
Publicado: 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7304021/
http://dx.doi.org/10.1007/978-3-030-50420-5_28
_version_ 1783548181740519424
author Liu, Zhicheng
Li, Shuhao
Zhang, Yongzheng
Yun, Xiaochun
Peng, Chengwei
author_facet Liu, Zhicheng
Li, Shuhao
Zhang, Yongzheng
Yun, Xiaochun
Peng, Chengwei
author_sort Liu, Zhicheng
collection PubMed
description Malicious domains are critical resources in network security, behind which attackers hide malware to launch the malicious attacks. Therefore, blocking malicious domains is the most effective and practical way to combat and reduce hostile activities. There are three limitations in previous methods over domain classification: (1) solely based on local domain features which tend to be not robust enough; (2) lack of a large number of ground truth for model-training to get high accuracy; (3) statically learning on graph which is not scalable. In this paper, we present Ringer, a scalable method to detect malicious domains by dynamic Graph Convolutional Network (GCN). Ringer first uses querying behaviors or domain-IP resolutions to construct domain graphs, on which the dynamic GCN is leveraged to learn the node representations that integrate both information about node features and graph structure. And then, these high-quality representations are further fed to the full-connected neural network for domain classification. Notably, instead of global statically learning, we adopt time-based hash to cut graphs to small ones and inductively learn the embedding of nodes according to selectively sampling neighbors. We construct a series of experiments on a large ISP over two days and compare it with state of the arts. The results demonstrate that Ringer achieves excellent performance with a high accuracy of 96.8% on average. Additionally, we find thousands of potential malicious domains by semi-supervised learning.
format Online
Article
Text
id pubmed-7304021
institution National Center for Biotechnology Information
language English
publishDate 2020
record_format MEDLINE/PubMed
spelling pubmed-73040212020-06-19 Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network Liu, Zhicheng Li, Shuhao Zhang, Yongzheng Yun, Xiaochun Peng, Chengwei Computational Science – ICCS 2020 Article Malicious domains are critical resources in network security, behind which attackers hide malware to launch the malicious attacks. Therefore, blocking malicious domains is the most effective and practical way to combat and reduce hostile activities. There are three limitations in previous methods over domain classification: (1) solely based on local domain features which tend to be not robust enough; (2) lack of a large number of ground truth for model-training to get high accuracy; (3) statically learning on graph which is not scalable. In this paper, we present Ringer, a scalable method to detect malicious domains by dynamic Graph Convolutional Network (GCN). Ringer first uses querying behaviors or domain-IP resolutions to construct domain graphs, on which the dynamic GCN is leveraged to learn the node representations that integrate both information about node features and graph structure. And then, these high-quality representations are further fed to the full-connected neural network for domain classification. Notably, instead of global statically learning, we adopt time-based hash to cut graphs to small ones and inductively learn the embedding of nodes according to selectively sampling neighbors. We construct a series of experiments on a large ISP over two days and compare it with state of the arts. The results demonstrate that Ringer achieves excellent performance with a high accuracy of 96.8% on average. Additionally, we find thousands of potential malicious domains by semi-supervised learning. 2020-05-22 /pmc/articles/PMC7304021/ http://dx.doi.org/10.1007/978-3-030-50420-5_28 Text en © Springer Nature Switzerland AG 2020 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Article
Liu, Zhicheng
Li, Shuhao
Zhang, Yongzheng
Yun, Xiaochun
Peng, Chengwei
Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network
title Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network
title_full Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network
title_fullStr Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network
title_full_unstemmed Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network
title_short Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network
title_sort ringer: systematic mining of malicious domains by dynamic graph convolutional network
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7304021/
http://dx.doi.org/10.1007/978-3-030-50420-5_28
work_keys_str_mv AT liuzhicheng ringersystematicminingofmaliciousdomainsbydynamicgraphconvolutionalnetwork
AT lishuhao ringersystematicminingofmaliciousdomainsbydynamicgraphconvolutionalnetwork
AT zhangyongzheng ringersystematicminingofmaliciousdomainsbydynamicgraphconvolutionalnetwork
AT yunxiaochun ringersystematicminingofmaliciousdomainsbydynamicgraphconvolutionalnetwork
AT pengchengwei ringersystematicminingofmaliciousdomainsbydynamicgraphconvolutionalnetwork