Computing domains reputation using flow

Igor Mishsky, Nurit Gal-Oz, Ehud Gudes

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The Domain Name System (DNS) is an essential component of the Internet infrastructure that translates domain names into IP addresses. Recent incidents verify the enormous damage of malicious activities utilizing DNS. Therefore, detecting malicious domains using the DNS network structure is an important challenge. We take the famous colloquial expression Tell me who your friends are and I will tell you who you are, motivating many social trust models, to the Internet domains world. We assert that a domain that is related to malicious domains is more likely to be malicious as well, and malicious domains may be identified by analyzing cross domains relationships. The term domain reputation represents the extent to which we consider a domain as malicious. In this paper we present a new approach for computing domain reputation by applying a flow algorithm on a DNS based graph. The experimental evaluation of the flow algorithm demonstrates significant success in predicting malicious domains.

Original languageEnglish
Title of host publication2014 9th International Conference for Internet Technology and Secured Transactions, ICITST 2014
PublisherInstitute of Electrical and Electronics Engineers
Pages426-431
Number of pages6
ISBN (Electronic)9781908320391
DOIs
StatePublished - 1 Jan 2014
Event2014 9th International Conference for Internet Technology and Secured Transactions, ICITST 2014 - London, United Kingdom
Duration: 8 Dec 201410 Dec 2014

Publication series

Name2014 9th International Conference for Internet Technology and Secured Transactions, ICITST 2014

Conference

Conference2014 9th International Conference for Internet Technology and Secured Transactions, ICITST 2014
Country/TerritoryUnited Kingdom
CityLondon
Period8/12/1410/12/14

Keywords

  • Flow model
  • Trust & Reputation
  • malicious domains

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications
  • Information Systems
  • Software

Fingerprint

Dive into the research topics of 'Computing domains reputation using flow'. Together they form a unique fingerprint.

Cite this