Netinfo Security ›› 2021, Vol. 21 ›› Issue (12): 1-8.doi: 10.3969/j.issn.1671-1122.2021.12.001

    Next Articles

Domain-Flux Malicious Domain Name Detection and Analysis Based on HMM

GUO Xiangmin1,2,3, LIANG Guangjun1,2,3(), XIA Lingling1,2,3   

  1. 1. Department of Computer Information and Cyber Security, Jiangsu Police Institute, Nanjing 210031, China
    2. Jiangsu Electronic Data Forensics and Analysis Engineering Research Center, Nanjing 210031, China
    3. Jiangsu Provincial Public Security Department Key Laboratory of Digital Forensics, Nanjing 210031, China
  • Received:2021-08-28 Online:2021-12-10 Published:2022-01-11
  • Contact: LIANG Guangjun E-mail:liangguangjun@jspi.cn

Abstract:

With widely using domain generation algorithm (DGA) to generate a large number of random domain names to avoid detection, botnet has become the primary threat to network security today. In addition, the research on DGA domain name identification methods has important practical significance for countering malicious programs, fighting botnet and ensuring information security. This paper designed a DGA domain name detection and analysed framework based on the ELK big data platform. On the basis of fully studying the existing DGA domain name identification methods such as blacklists, this paper collected the request query log of the DNS business system. By adopting the hidden Markov model to perform cluster analysis on malicious domain names, the judgment of DGA domain names could be realized, and further ideas could be provided for evidence collection and source tracing of botnet and other cyber-attacks. Experimental results show that the lightweight detection classifier used in this paper can distinguish between normal domain names and malicious domain names more clearly.

Key words: network forensics, hidden Markov model, malicious domain name detection, ELK

CLC Number: