Netinfo Security ›› 2021, Vol. 21 ›› Issue (10): 69-75.doi: 10.3969/j.issn.1671-1122.2021.10.010

Previous Articles     Next Articles

Malicious Domain Name Training Data Generation Technology Based on Improved CNN Model

MA Xiao, CAI Manchun(), LU Tianliang   

  1. College of Information Network Security, People’s Public Security University of China, Beijing 100038, China
  • Received:2021-05-06 Online:2021-10-10 Published:2021-10-14
  • Contact: CAI Manchun E-mail:caimanchun@ppsuc.edu.cn

Abstract:

In recent years, new botnets have begun to use command and control (C&C) server communication to attack and use domain name generation algorithms (DGA) to avoid detection. The traditional algorithm of domain name generation has some disadvantages,such as low addressing efficiency and easy detection due to the corresponding code traffic of a large number of domains. In this paper, we use the self-attention mechanism of BI-LSTM to generate malicious domain name by improving the traditional CNN model and combining with the related ideas of text generation. The final results show that the domain name data generated by this method can be used as real domain name data in the comparative experiment, which improves the efficiency of detecting malicious domain name.

Key words: malicious domain name, convolutional neural network, botnet, machine learning

CLC Number: