A Malicious Domains Detection Method Based on File Sandbox Traffic

  • Daojing He*
  • , Jiayu Dai
  • , Hongjie Gu
  • , Shanshan Zhu
  • , Sammy Chan
  • , Jingyong Su
  • , Mohsen Guizani
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

With the recent increasing number of malicious cyber activities using domain names as attack vectors, malicious domains must be detected and blocked in order to combat cyber attackers. However, current studies of malicious domains detection are limited to Domain Name System (DNS) traffic features or character features, which ignore the associations of malware and malicious domain in the detection. In this paper, we propose a malicious domains detection approach based on domain relationship features extracted from real sandbox traffic. We construct heterogeneous graphs based on sandbox traffic and use the Relational Graph Convolutional Network (RGCN) to build detection models to extract inter-node relationship features. Experiments were conducted using data extracted from real sandbox traffic, and our approach achieved an accuracy of 87.11%. The experimental results demonstrate the effectiveness of using relationship features extracted from sandbox traffic for malicious domains detection.

Original languageEnglish
Pages (from-to)182-188
Number of pages7
JournalIEEE Network
Volume37
Issue number6
DOIs
StatePublished - 1 Nov 2023
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 1986-2012 IEEE.

ASJC Scopus subject areas

  • Software
  • Information Systems
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'A Malicious Domains Detection Method Based on File Sandbox Traffic'. Together they form a unique fingerprint.

Cite this