Home>Schools

  • Complex
  • Title
  • Author
  • Keyword
  • Abstract
  • Scholars
Search

[期刊]

HANDOM: Heterogeneous Attention Network Model for Malicious Domain Detection

Share
Edit Delete Claim

Author:

Wang, Qing (Wang, Qing.) | Dong, Cong (Dong, Cong.) | Jian, Shijie (Jian, Shijie.) | Unfold

Indexed by:

EI SCIE Scopus Engineering Village

Abstract:

Malicious domains are crucial vectors for attackers to conduct malicious activities. With the increasing numbers in domain-based attack activities and the enhancement of attacker evasion methods, the detection of malicious domains has become critical and increasingly difficult. Statistical feature-based and graph structure-based detection methods are mainstream technical approaches. However, highly hidden domains can escape feature detection, and the detection range of graph structure-based methods is limited. Based on these, we propose a malicious detection method called HANDOM. HANDOM combines statistical features and graph structural information to neutralize their limitations, and uses the Heterogeneous Attention Network (HAN) model to jointly handle both information to achieve high-performance malicious domain classification. We conduct experimental evaluations on real-world datasets and compare HANDOM with machine learning methods and other malicious detection methods. The results present that HANDOM has superior and robust performance, and can identify highly hidden domains. © 2022

Keyword:

Classification (of information) Feature extraction Graphic methods Learning systems Malware

Author Community:

  • [ 1 ] [Wang, Qing]Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
  • [ 2 ] [Wang, Qing]School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China
  • [ 3 ] [Dong, Cong]Zhongguancun Laboratory, Beijing, China
  • [ 4 ] [Jian, Shijie]The First Research Institute of the, Ministry of Public Security of P.R.C, Beijing, China
  • [ 5 ] [Du, Dan]Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
  • [ 6 ] [Du, Dan]School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China
  • [ 7 ] [Lu, Zhigang]Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
  • [ 8 ] [Lu, Zhigang]School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China
  • [ 9 ] [Qi, Yinhao]Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
  • [ 10 ] [Qi, Yinhao]School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China
  • [ 11 ] [Han, Dongxu]Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
  • [ 12 ] [Han, Dongxu]School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China
  • [ 13 ] [Ma, Xiaobo]School of Computer Science and Technology, Xi'an Jiaotong University, Xi'an, China
  • [ 14 ] [Wang, Fei]Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China
  • [ 15 ] [Liu, Yuling]Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
  • [ 16 ] [Liu, Yuling]School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China

Reprint Author's Address:

  • Y. Liu;;Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China;;email: wangfei@ict.ac.cn;;

Show more details

Source :

Computers and Security

ISSN: 0167-4048

Year: 2023

Volume: 125

4 . 4 3 8

JCR@2020

ESI Discipline: COMPUTER SCIENCE;

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 6

30 Days PV: 0

FAQ| About| Online/Total:222/217232488
Address:XI'AN JIAOTONG UNIVERSITY LIBRARY(No.28, Xianning West Road, Xi'an, Shaanxi Post Code:710049) Contact Us:029-82667865
Copyright:XI'AN JIAOTONG UNIVERSITY LIBRARY Technical Support:Beijing Aegean Software Co., Ltd.