A Malicious Domains Detection Method Based on File Sandbox Traffic

Daojing He*, Jiayu Dai, Hongjie Gu, Shanshan Zhu, Sammy Chan, Jingyong Su, Mohsen Guizani

*Corresponding author for this work

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

1 Citation (Scopus)

Abstract

With the recent increasing number of malicious cyber activities using domain names as attack vectors, malicious domains must be detected and blocked in order to combat cyber attackers. However, current studies of malicious domains detection are limited to Domain Name System (DNS) traffic features or character features, which ignore the associations of malware and malicious domains in the detection. In this paper, we propose a malicious domains detection approach based on domain relationship features extracted from real sandbox traffic. We construct heterogeneous graphs based on sandbox traffic and use the Relational Graph Convolutional Network (RGCN) to build detection models to extract inter-node relationship features. Experiments are conducted using data extracted from real sandbox traffic, and our approach achieves an accuracy of 87.11%. The experimental results demonstrate the effectiveness of using relationship features extracted from sandbox traffic for malicious domains detection. © 2022 IEEE.
Original languageEnglish
Pages (from-to)182-188
Number of pages7
JournalIEEE Network
Volume37
Issue number6
Online published25 Oct 2022
DOIs
Publication statusPublished - Nov 2023

Research Keywords

  • Blocklists
  • Data mining
  • Feature extraction
  • IP networks
  • Task analysis
  • Uniform resource locators
  • Viruses (medical)
  • Malicious domains detection
  • Heterogeneous information network
  • Relational graph convolutional network
  • Sandbox traffic

Fingerprint

Dive into the research topics of 'A Malicious Domains Detection Method Based on File Sandbox Traffic'. Together they form a unique fingerprint.

Cite this