dc.contributor | Universidade Estadual Paulista (Unesp) | |
dc.contributor | Brazilian Network Information Center | |
dc.date.accessioned | 2021-06-25T11:10:33Z | |
dc.date.accessioned | 2022-12-19T22:39:46Z | |
dc.date.available | 2021-06-25T11:10:33Z | |
dc.date.available | 2022-12-19T22:39:46Z | |
dc.date.created | 2021-06-25T11:10:33Z | |
dc.date.issued | 2020-11-24 | |
dc.identifier | 2020 IEEE 19th International Symposium on Network Computing and Applications, NCA 2020. | |
dc.identifier | http://hdl.handle.net/11449/208337 | |
dc.identifier | 10.1109/NCA51143.2020.9306704 | |
dc.identifier | 2-s2.0-85099723851 | |
dc.identifier.uri | https://repositorioslatinoamericanos.uchile.cl/handle/2250/5388934 | |
dc.description.abstract | The Domain Name System (DNS) is an essential component for the Internet, as its main function is to map the domain name to Internet Protocol addresses, in which the hosts respond. Because of its importance, attackers use this tool for malicious purposes such as spreading malware, botnets, fast-flux domains, and Domain Generation Algorithms (DGAs). In this paper, we present an approach to automatically detect malicious domains using passive DNS, using the supervised machine learning algorithm Extreme Gradient Boosting (XGBoost). We use 12 features extracted exclusively from DNS traffic. The model's evaluation proved its effectiveness with an average AUC of 0.9763. | |
dc.language | eng | |
dc.relation | 2020 IEEE 19th International Symposium on Network Computing and Applications, NCA 2020 | |
dc.source | Scopus | |
dc.subject | Domain Name System | |
dc.subject | machine learning | |
dc.subject | malicious domain | |
dc.subject | passive DNS | |
dc.title | XGBoost Applied to Identify Malicious Domains Using Passive DNS | |
dc.type | Actas de congresos | |