{"title":"基于无监督检测的针对DNS的条件gan","authors":"Mathias Lundteigen Mohus, Emil Henry Flakk","doi":"10.1109/CW55638.2022.00059","DOIUrl":null,"url":null,"abstract":"While Unsupervised Learning methods have been employed in detecting malicious domains using DNS data, it is unknown if these techniques are robust in an adversarial setting. We present a novel method using a conditional GAN, where DNS data could be generated to evade detection, while maintaining adversarial functionality. This could also be employed defensively, by using the discriminator as a detector.","PeriodicalId":169421,"journal":{"name":"International Conference on Cyberworlds","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Conditional GANs against DNS based unsupervised detection of malicious domains\",\"authors\":\"Mathias Lundteigen Mohus, Emil Henry Flakk\",\"doi\":\"10.1109/CW55638.2022.00059\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"While Unsupervised Learning methods have been employed in detecting malicious domains using DNS data, it is unknown if these techniques are robust in an adversarial setting. We present a novel method using a conditional GAN, where DNS data could be generated to evade detection, while maintaining adversarial functionality. This could also be employed defensively, by using the discriminator as a detector.\",\"PeriodicalId\":169421,\"journal\":{\"name\":\"International Conference on Cyberworlds\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Cyberworlds\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CW55638.2022.00059\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Cyberworlds","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CW55638.2022.00059","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Conditional GANs against DNS based unsupervised detection of malicious domains
While Unsupervised Learning methods have been employed in detecting malicious domains using DNS data, it is unknown if these techniques are robust in an adversarial setting. We present a novel method using a conditional GAN, where DNS data could be generated to evade detection, while maintaining adversarial functionality. This could also be employed defensively, by using the discriminator as a detector.