• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

An Active Malware Detection System for Secure Campus Networks

Research Project

Project/Area Number 18K11296
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Review Section Basic Section 60070:Information security-related
Research InstitutionKyushu Institute of Technology

Principal Investigator

Satoh Akihiro  九州工業大学, 情報基盤センター, 助教 (30609376)

Project Period (FY) 2018-04-01 – 2021-03-31
Project Status Completed (Fiscal Year 2020)
Budget Amount *help
¥4,160,000 (Direct Cost: ¥3,200,000、Indirect Cost: ¥960,000)
Fiscal Year 2020: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Fiscal Year 2019: ¥650,000 (Direct Cost: ¥500,000、Indirect Cost: ¥150,000)
Fiscal Year 2018: ¥2,080,000 (Direct Cost: ¥1,600,000、Indirect Cost: ¥480,000)
Keywordsネットワークセキュリティ / DGAマルウェア / ドメイン名 / 機械学習 / マルウェア / C&C / Network Security / DGA Bot
Outline of Final Research Achievements

Some of the most serious security threats facing computer networks involve malware. To prevent malware-related damage, administrators must swiftly identify and remove the infected machines that may reside in their networks. However, many malware families have domain generation algorithms (DGAs) to avoid detection. In this research project, we develop a system to detect malware-infected machines from massive DNS queries. Here, we focus on queried domain names for the DNSs because name resolution is an unencrypted interaction that always occurs prior to malware communication. Our system mainly has two features to detect the infected machines by superficially analyzing DNS queries and to actively collect information about malware families by forcibly changing their callback destinations.

Academic Significance and Societal Importance of the Research Achievements

総務省は,オリンピックの東京開催を見据え,公衆無線LANの整備を推進している.加えて,高等教育の現場では,学生個人の端末を必携とするBYOD体制を検討する動きが盛んになってきている.このように,自身が所有する端末を外出先のネットワークに接続する利用形態は,今後増加するものと想像できる.その一方,マルウェアに感染した端末をネットワークに持ち込まれる可能性はより高まることになる.本研究の成果は,ネットワークに内在する感染端末を迅速に排除することを可能とする.故に,公衆無線LANやキャンパスネットワークなど,端末の持ち込みを前提としたネットワークにおいて,セキュリティの向上に大きく寄与する.

Report

(4 results)
  • 2020 Annual Research Report   Final Research Report ( PDF )
  • 2019 Research-status Report
  • 2018 Research-status Report
  • Research Products

    (12 results)

All 2021 2020 2019 2018

All Journal Article (5 results) (of which Peer Reviewed: 5 results,  Open Access: 2 results) Presentation (7 results) (of which Int'l Joint Research: 3 results)

  • [Journal Article] 辞書に基づくDGAマルウェアに起因した悪性ドメインの判別2021

    • Author(s)
      佐藤 彰洋, 福田 豊, 井上 純一, 中村 豊
    • Journal Title

      情報処理学会論文誌

      Volume: 62

    • NAID

      170000184459

    • Related Report
      2020 Annual Research Report
    • Peer Reviewed
  • [Journal Article] DGAマルウェアにより自動生成された悪性ドメインの判別2021

    • Author(s)
      佐藤 彰洋, 林 豊洋, 和田 数字郎, 福田 豊
    • Journal Title

      情報処理学会論文誌

      Volume: 62

    • NAID

      170000184872

    • Related Report
      2020 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Superficial Analysis Approach for Identifying Malicious Domain Names Generated by DGA Malware2020

    • Author(s)
      Akihiro Satoh, Yutaka Fukuda, Toyohiro Hayashi, Gen Kitagata
    • Journal Title

      IEEE Open Journal of the Communications Society

      Volume: 1

    • Related Report
      2020 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Clustering Malicious DNS Queries for Blacklist-Based Detection2019

    • Author(s)
      Akihiro Satoh, Yutaka Nakamura, Daiki Nobayashi, Kazuto Sasai, Gen Kitagata, Takeshi Ikenaga
    • Journal Title

      IEICE Transactions on Information and Systems

      Volume: E102.D Issue: 7 Pages: 1404-1407

    • DOI

      10.1587/transinf.2018EDL8211

    • NAID

      130007671324

    • ISSN
      0916-8532, 1745-1361
    • Year and Date
      2019-07-01
    • Related Report
      2019 Research-status Report 2018 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] Estimating the Randomness of Domain Names for DGA Bot Callbacks2018

    • Author(s)
      Akihiro Satoh, Yutaka Nakamura, Daiki Nobayashi, Takeshi Ikenaga
    • Journal Title

      IEEE Communications Letters

      Volume: 22

    • Related Report
      2018 Research-status Report
    • Peer Reviewed
  • [Presentation] Identifying Malicious Domain Names Caused by Dictionary-based DGA Bots2021

    • Author(s)
      Akihiro Satoh, Yutaka Nakamura, Gen Kitagata
    • Organizer
      RIEC Annual Meeting on Cooperative Research Projects
    • Related Report
      2020 Annual Research Report
    • Int'l Joint Research
  • [Presentation] A Malicious Domain Detection Approach for Callbacks of DGA Bots2020

    • Author(s)
      Akihiro Satoh, Yutaka Nakamura, Kazuto Sasai, Gen Kitagata
    • Organizer
      RIEC Annual Meeting on Cooperative Research Projects
    • Related Report
      2019 Research-status Report
    • Int'l Joint Research
  • [Presentation] 辞書に基づくDGAボットにより生成された悪性ドメインの判別2019

    • Author(s)
      佐藤彰洋,福田豊,和田数字郎,中村豊
    • Organizer
      インターネットと運用技術シンポジウム
    • Related Report
      2019 Research-status Report
  • [Presentation] A Malicious DNS Query Clustering Approach for Blacklist-based Detection2019

    • Author(s)
      Akihiro Satoh, Yutaka Nakamura, Kazuto Sasai, Gen Kitagata
    • Organizer
      RIEC Annual Meeting on Cooperative Research Projects
    • Related Report
      2018 Research-status Report
    • Int'l Joint Research
  • [Presentation] 原因に基づく悪性DNSクエリの分類2019

    • Author(s)
      佐藤彰洋, 中村豊, 笹井一人, 北形元
    • Organizer
      第25回先進的情報通信工学研究会
    • Related Report
      2018 Research-status Report
  • [Presentation] ブラックリストに基づく検出の効率化に向けた悪性DNSクエリ分類手法2018

    • Author(s)
      佐藤彰洋, 中村豊, 小倉光貴, 野林大起, 池永全志
    • Organizer
      インターネットと運用技術シンポジウム
    • Related Report
      2018 Research-status Report
  • [Presentation] ブラックリストにより検出された悪性DNSクエリの分類2018

    • Author(s)
      佐藤彰洋, 中村豊, 小倉光貴, 野林大起, 池永全志
    • Organizer
      インターネットアーキテクチャ研究会
    • Related Report
      2018 Research-status Report

URL: 

Published: 2018-04-23   Modified: 2022-01-27  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi