Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Internet malicious domain name detection method based on credibility

A domain name detection and credibility technology, applied in network data retrieval, network data indexing, and other database retrieval, etc., can solve problems such as difficulty in resisting new domain names, obvious degree of model degradation, and inability to obtain comprehensive and accurate results in domain name prediction

Active Publication Date: 2020-08-25
NANKAI UNIV
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to solve the problem that traditional analysis methods are difficult to resist new domain names and the degree of model degradation is obvious in the case of increasing number of domain names, resulting in the inability to obtain comprehensive and accurate results for domain name predictions, and to provide a credibility-based Internet Malicious domain name detection method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet malicious domain name detection method based on credibility
  • Internet malicious domain name detection method based on credibility
  • Internet malicious domain name detection method based on credibility

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The present invention takes the realization of feature value modeling as an example for specific description. Any machine learning algorithm that builds a model by inputting the feature value of a domain name set can be used in this method. The method flow is as follows: figure 1 In this embodiment, four machine learning algorithms, XGBoost, LSTM, Bagging, and Support Vector Machine (SVM) are used as examples for illustration. The specific introduction is as follows:

[0069] XGBoost, full name eXtreme Gradient Boosting, is a boosting iterative algorithm and tree algorithm based on GBDT. It is mainly used in classification and regression. It has fast speed and good effect. It can calculate and process large amounts of data in parallel, supports custom loss functions, and can perform Regularization, highly flexible, capable of missing value processing and pruning, built-in cross-validation, and continuous training on the basis of existing models, etc., but the release time o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an Internet malicious domain name detection method based on credibility. The method is applied to the field of network space safety. The method comprises the following steps: 1, learning massive malicious domain name samples and normal domain name samples by using various machine learning such as XGBoost, LSTM and Bagging, and establishing malicious domain name detection models of various heterogeneous algorithms; 2, calculating the credibility of a plurality of detection models such as XGBoost, LSTM and Bagging to the suspicious domain name prediction result through astatistical learning algorithm; and 3, fusing the multi-model prediction results by utilizing the credibility of the model prediction results obtained by calculation to realize collaborative defense of the heterogeneous model. According to the method, 13 domain name feature values are selected, multiple machine learning models are utilized to analyze the domain names to obtain credibility, a simple voting method is adopted to fuse the models on the basis of the credibility, and domain name analysis accuracy is improved.

Description

Technical field [0001] The invention belongs to the field of computer network space security. Background technique [0002] With the development of the network, cyberspace security has received attention from all aspects, and the endless threats to cyberspace security have also become new challenges that people have to face. The rapid growth of targeted cyber attacks directly gave birth to domain name services; and domain name analysis has always been a hot issue in the field of cyberspace security, which can make threats more visible, respond to targeted attacks more quickly, strengthen strategic planning and investment, and effectively mitigate them. The current imbalance between offense and defense in the fight against network attacks also provides technical support for real-time awareness of the network situation. In recent years, the number of cyberspace security threats in my country has surged. However, the analysis of malicious domain names in my country still has probl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/33G06F16/951H04L29/06H04L29/12G06N20/00
CPCG06F16/3331G06F16/951H04L63/1416G06N20/00H04L61/4511
Inventor 王志李涵林宇量詹婧于涛
Owner NANKAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products