Improving the Identification of Real-world Malware's DNS Covert Channels Using Locality Sensitive Hashing
By: Pascal Ruffing , Denis Petrov , Sebastian Zillien and more
Potential Business Impact:
Finds hidden computer viruses using website names.
Nowadays, malware increasingly uses DNS-based covert channels in order to evade detection and maintain stealthy communication with its command-and-control servers. While prior work has focused on detecting such activity, identifying specific malware families and their behaviors from captured network traffic remains challenging due to the variability of DNS. In this paper, we present the first application of Locality Sensitive Hashing to the detection and identification of real-world malware utilizing DNS covert channels. Our approach encodes DNS subdomain sequences into statistical similarity features that effectively capture anomalies indicative of malicious activity. Combined with a Random Forest classifier, our method achieves higher accuracy and reduced false positive rates than prior approaches, while demonstrating improved robustness and generalization to previously unseen or modified malware samples. We further demonstrate that our approach enables reliable classification of malware behavior (e.g., uploading or downloading of files), based solely on DNS subdomains.
Similar Papers
Comparative Analysis of Hash-based Malware Clustering via K-Means
Cryptography and Security
Finds computer viruses faster and better.
A Hybrid Deep Learning and Anomaly Detection Framework for Real-Time Malicious URL Classification
Cryptography and Security
Stops bad websites from tricking you online.
Lightweight CNN Model Hashing with Higher-Order Statistics and Chaotic Mapping for Piracy Detection and Tamper Localization
Cryptography and Security
Finds stolen or changed computer brains.