Home > Research > Publications & Outputs > AI-based detection of DNS misuse for network se...

Associated organisational unit

View graph of relations

AI-based detection of DNS misuse for network security

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

AI-based detection of DNS misuse for network security. / Chiscop, Irina; Soro, Francesca; Smith, Paul.
NativeNI 2022 - Proceedings of the 1st International Workshop on Native Network Intelligence, Part of CoNEXT 2022. New York: Association for Computing Machinery (ACM), 2022. p. 27-32 (NativeNI 2022 - Proceedings of the 1st International Workshop on Native Network Intelligence, Part of CoNEXT 2022).

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Chiscop, I, Soro, F & Smith, P 2022, AI-based detection of DNS misuse for network security. in NativeNI 2022 - Proceedings of the 1st International Workshop on Native Network Intelligence, Part of CoNEXT 2022. NativeNI 2022 - Proceedings of the 1st International Workshop on Native Network Intelligence, Part of CoNEXT 2022, Association for Computing Machinery (ACM), New York, pp. 27-32, 1st International Workshop on Native Network Intelligence, Rome, Italy, 9/12/22. https://doi.org/10.1145/3565009.3569523

APA

Chiscop, I., Soro, F., & Smith, P. (2022). AI-based detection of DNS misuse for network security. In NativeNI 2022 - Proceedings of the 1st International Workshop on Native Network Intelligence, Part of CoNEXT 2022 (pp. 27-32). (NativeNI 2022 - Proceedings of the 1st International Workshop on Native Network Intelligence, Part of CoNEXT 2022). Association for Computing Machinery (ACM). https://doi.org/10.1145/3565009.3569523

Vancouver

Chiscop I, Soro F, Smith P. AI-based detection of DNS misuse for network security. In NativeNI 2022 - Proceedings of the 1st International Workshop on Native Network Intelligence, Part of CoNEXT 2022. New York: Association for Computing Machinery (ACM). 2022. p. 27-32. (NativeNI 2022 - Proceedings of the 1st International Workshop on Native Network Intelligence, Part of CoNEXT 2022). doi: 10.1145/3565009.3569523

Author

Chiscop, Irina ; Soro, Francesca ; Smith, Paul. / AI-based detection of DNS misuse for network security. NativeNI 2022 - Proceedings of the 1st International Workshop on Native Network Intelligence, Part of CoNEXT 2022. New York : Association for Computing Machinery (ACM), 2022. pp. 27-32 (NativeNI 2022 - Proceedings of the 1st International Workshop on Native Network Intelligence, Part of CoNEXT 2022).

Bibtex

@inproceedings{03c12cd127b04af8a5478ff601d818c7,
title = "AI-based detection of DNS misuse for network security",
abstract = "Threat hunting and malware prediction are critical activities to ensure network and system security. These tasks are difficult due to increasing numbers of sophisticated malware families. Automatically detecting anomalous Domain Name System (DNS) queries in operational traffic facilitates the detection of new malware infections, significantly contributing to the work of security practitioners. In this paper, we present two AI-based Domain Generation Algorithm (DGA) detection and classification techniques - a feature-based one, leveraging classic Machine Learning algorithms and a featureless one, based on Deep Learning - specifically intended to aid in this task. Both techniques are designed to be integrated in operational environments, dealing with hundreds of thousands to millions of new malware samples per day. We report the implementation details, the classification performance, the advantages and shortcomings for both techniques, as well as experiences from the deployment of this system in an industrial environment. We show that both techniques reach more than the 90% of accuracy in the case of binary DGA detection, with a slight degradation in performance in the multi-class classification case, in which the results strongly depend on the malware type.",
author = "Irina Chiscop and Francesca Soro and Paul Smith",
year = "2022",
month = dec,
day = "9",
doi = "10.1145/3565009.3569523",
language = "English",
series = "NativeNI 2022 - Proceedings of the 1st International Workshop on Native Network Intelligence, Part of CoNEXT 2022",
publisher = "Association for Computing Machinery (ACM)",
pages = "27--32",
booktitle = "NativeNI 2022 - Proceedings of the 1st International Workshop on Native Network Intelligence, Part of CoNEXT 2022",
address = "United States",
note = "1st International Workshop on Native Network Intelligence ; Conference date: 09-12-2022",

}

RIS

TY - GEN

T1 - AI-based detection of DNS misuse for network security

AU - Chiscop, Irina

AU - Soro, Francesca

AU - Smith, Paul

PY - 2022/12/9

Y1 - 2022/12/9

N2 - Threat hunting and malware prediction are critical activities to ensure network and system security. These tasks are difficult due to increasing numbers of sophisticated malware families. Automatically detecting anomalous Domain Name System (DNS) queries in operational traffic facilitates the detection of new malware infections, significantly contributing to the work of security practitioners. In this paper, we present two AI-based Domain Generation Algorithm (DGA) detection and classification techniques - a feature-based one, leveraging classic Machine Learning algorithms and a featureless one, based on Deep Learning - specifically intended to aid in this task. Both techniques are designed to be integrated in operational environments, dealing with hundreds of thousands to millions of new malware samples per day. We report the implementation details, the classification performance, the advantages and shortcomings for both techniques, as well as experiences from the deployment of this system in an industrial environment. We show that both techniques reach more than the 90% of accuracy in the case of binary DGA detection, with a slight degradation in performance in the multi-class classification case, in which the results strongly depend on the malware type.

AB - Threat hunting and malware prediction are critical activities to ensure network and system security. These tasks are difficult due to increasing numbers of sophisticated malware families. Automatically detecting anomalous Domain Name System (DNS) queries in operational traffic facilitates the detection of new malware infections, significantly contributing to the work of security practitioners. In this paper, we present two AI-based Domain Generation Algorithm (DGA) detection and classification techniques - a feature-based one, leveraging classic Machine Learning algorithms and a featureless one, based on Deep Learning - specifically intended to aid in this task. Both techniques are designed to be integrated in operational environments, dealing with hundreds of thousands to millions of new malware samples per day. We report the implementation details, the classification performance, the advantages and shortcomings for both techniques, as well as experiences from the deployment of this system in an industrial environment. We show that both techniques reach more than the 90% of accuracy in the case of binary DGA detection, with a slight degradation in performance in the multi-class classification case, in which the results strongly depend on the malware type.

U2 - 10.1145/3565009.3569523

DO - 10.1145/3565009.3569523

M3 - Conference contribution/Paper

T3 - NativeNI 2022 - Proceedings of the 1st International Workshop on Native Network Intelligence, Part of CoNEXT 2022

SP - 27

EP - 32

BT - NativeNI 2022 - Proceedings of the 1st International Workshop on Native Network Intelligence, Part of CoNEXT 2022

PB - Association for Computing Machinery (ACM)

CY - New York

T2 - 1st International Workshop on Native Network Intelligence

Y2 - 9 December 2022

ER -