The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Diferentes tipos de ataques maliciosos têm aumentado simultaneamente e tornaram-se um problema sério para a segurança cibernética. A maioria dos ataques utiliza URLs de domínio como meio de comunicação de ataque e transforma os usuários em vítimas de phishing ou spam. Aproveitamos os métodos de aprendizado de máquina para detectar automaticamente a maldade de um domínio usando três recursos: recursos baseados em DNS, léxicos e semânticos. A abordagem proposta apresenta alto desempenho mesmo com um pequeno conjunto de dados de treinamento. Os resultados experimentais demonstram que o esquema proposto atinge uma precisão aproximada de 0.927 ao utilizar um classificador florestal aleatório.
Thin Tharaphe THEIN
Kobe University
Yoshiaki SHIRAISHI
Kobe University
Masakatu MORII
Kobe University
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copiar
Thin Tharaphe THEIN, Yoshiaki SHIRAISHI, Masakatu MORII, "Malicious Domain Detection Based on Decision Tree" in IEICE TRANSACTIONS on Information,
vol. E106-D, no. 9, pp. 1490-1494, September 2023, doi: 10.1587/transinf.2022OFL0002.
Abstract: Different types of malicious attacks have been increasing simultaneously and have become a serious issue for cybersecurity. Most attacks leverage domain URLs as an attack communications medium and compromise users into a victim of phishing or spam. We take advantage of machine learning methods to detect the maliciousness of a domain automatically using three features: DNS-based, lexical, and semantic features. The proposed approach exhibits high performance even with a small training dataset. The experimental results demonstrate that the proposed scheme achieves an approximate accuracy of 0.927 when using a random forest classifier.
URL: https://global.ieice.org/en_transactions/information/10.1587/transinf.2022OFL0002/_p
Copiar
@ARTICLE{e106-d_9_1490,
author={Thin Tharaphe THEIN, Yoshiaki SHIRAISHI, Masakatu MORII, },
journal={IEICE TRANSACTIONS on Information},
title={Malicious Domain Detection Based on Decision Tree},
year={2023},
volume={E106-D},
number={9},
pages={1490-1494},
abstract={Different types of malicious attacks have been increasing simultaneously and have become a serious issue for cybersecurity. Most attacks leverage domain URLs as an attack communications medium and compromise users into a victim of phishing or spam. We take advantage of machine learning methods to detect the maliciousness of a domain automatically using three features: DNS-based, lexical, and semantic features. The proposed approach exhibits high performance even with a small training dataset. The experimental results demonstrate that the proposed scheme achieves an approximate accuracy of 0.927 when using a random forest classifier.},
keywords={},
doi={10.1587/transinf.2022OFL0002},
ISSN={1745-1361},
month={September},}
Copiar
TY - JOUR
TI - Malicious Domain Detection Based on Decision Tree
T2 - IEICE TRANSACTIONS on Information
SP - 1490
EP - 1494
AU - Thin Tharaphe THEIN
AU - Yoshiaki SHIRAISHI
AU - Masakatu MORII
PY - 2023
DO - 10.1587/transinf.2022OFL0002
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E106-D
IS - 9
JA - IEICE TRANSACTIONS on Information
Y1 - September 2023
AB - Different types of malicious attacks have been increasing simultaneously and have become a serious issue for cybersecurity. Most attacks leverage domain URLs as an attack communications medium and compromise users into a victim of phishing or spam. We take advantage of machine learning methods to detect the maliciousness of a domain automatically using three features: DNS-based, lexical, and semantic features. The proposed approach exhibits high performance even with a small training dataset. The experimental results demonstrate that the proposed scheme achieves an approximate accuracy of 0.927 when using a random forest classifier.
ER -