[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3590777.3590795acmotherconferencesArticle/Chapter ViewAbstractPublication PageseiccConference Proceedingsconference-collections
short-paper
Open access

DGA Detection Using Similarity-Preserving Bloom Encodings

Published: 14 June 2023 Publication History

Abstract

The sanitization of concise data samples can be challenging, as they do not provide a clear distinction between sensitive and non-sensitive parts within individual samples. In this context, traditional sanitization and anonymization measures are not applicable. We consider the detection of algorithmically generated domains through machine learning as an example of such a case, where the benign samples may leak sensitive information. Within this scenario, we evaluate the use of a similarity-preserving Bloom encoding technique to obscure the training samples.

References

[1]
Arthur Drichel, Mehdi Akbari Gurabi, Tim Amelung, and Ulrike Meyer. 2021. Towards Privacy-Preserving Classification-as-a-Service for DGA Detection. In 2021 18th International Conference on Privacy, Security and Trust (PST). 1–10. https://doi.org/10.1109/PST52912.2021.9647755
[2]
Arthur Drichel, Ulrike Meyer, Samuel Schüppen, and Dominik Teubert. 2020. Analyzing the Real-World Applicability of DGA Classifiers. In Proceedings of the 15th International Conference on Availability, Reliability and Security (Virtual Event, Ireland) (ARES ’20). Association for Computing Machinery, New York, NY, USA, Article 15, 11 pages. https://doi.org/10.1145/3407023.3407030
[3]
Arthur Drichel, Ulrike Meyer, Samuel Schüppen, and Dominik Teubert. 2020. Making Use of NXt to Nothing: The Effect of Class Imbalances on DGA Detection Classifiers. In Proceedings of the 15th International Conference on Availability, Reliability and Security (Virtual Event, Ireland) (ARES ’20). Association for Computing Machinery, New York, NY, USA, Article 85, 9 pages. https://doi.org/10.1145/3407023.3409190
[4]
Úlfar Erlingsson, Vasyl Pihur, and Aleksandra Korolova. 2014. RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (Scottsdale, Arizona, USA) (CCS ’14). Association for Computing Machinery, New York, NY, USA, 1054–1067. https://doi.org/10.1145/2660267.2660348
[5]
Ashwin Machanavajjhala, Daniel Kifer, Johannes Gehrke, and Muthuramakrishnan Venkitasubramaniam. 2007. L-Diversity: Privacy beyond k-Anonymity. ACM Trans. Knowl. Discov. Data 1, 1 (mar 2007), 3–es. https://doi.org/10.1145/1217299.1217302
[6]
William Mitchell, Rinku Dewri, Ramakrishna Thurimella, and Max Roschke. 2017. A graph traversal attack on Bloom filter-based medical data aggregation.Int. J. Big Data Intell. 4, 4 (2017), 217–226.
[7]
Lasse Nitz, Mehdi Akbari Gurabi, Avikarsha Mandal, and Benjamin Heitmann. 2021. Towards Privacy-Preserving Sharing of Cyber Threat Intelligence for Effective Response and Recovery. ERCIM NEWS 126 (2021), 33–34.
[8]
Daniel Plohmann, Khaled Yakdan, Michael Klatt, Johannes Bader, and Elmar Gerhards-Padilla. 2016. A comprehensive measurement study of domain generating malware. In 25th USENIX Security Symposium (USENIX Security 16). 263–278.
[9]
Thilina Ranbaduge and Rainer Schnell. 2020. Securing Bloom Filters for Privacy-Preserving Record Linkage. In Proceedings of the 29th ACM International Conference on Information & Knowledge Management (Virtual Event, Ireland) (CIKM ’20). Association for Computing Machinery, New York, NY, USA, 2185–2188. https://doi.org/10.1145/3340531.3412105
[10]
Rainer Schnell, Tobias Bachteler, and Jörg Reiher. 2009. Privacy-preserving record linkage using Bloom filters. BMC Medical Informatics and Decision Making 9, 1 (2009), 41.
[11]
Rainer Schnell and Christian Borgs. 2016. Randomized Response and Balanced Bloom Filters for Privacy Preserving Record Linkage. In 2016 IEEE 16th International Conference on Data Mining Workshops (ICDMW). 218–224. https://doi.org/10.1109/ICDMW.2016.0038
[12]
Reza Shokri, Marco Stronati, Congzheng Song, and Vitaly Shmatikov. 2017. Membership inference attacks against machine learning models. In 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 3–18.
[13]
Latanya Sweeney. 2002. k-Anonymity: A Model for Protecting Privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 10, 05 (2002), 557–570.
[14]
Bin Yu, Jie Pan, Jiaming Hu, Anderson Nascimento, and Martine De Cock. 2018. Character Level based Detection of DGA Domain Names. In 2018 International Joint Conference on Neural Networks (IJCNN). 1–8. https://doi.org/10.1109/IJCNN.2018.8489147

Cited By

View all
  • (2024)Towards Privacy-Preserving Machine Learning in Sovereign Data Spaces: Opportunities and ChallengesPrivacy and Identity Management. Sharing in a Digital World10.1007/978-3-031-57978-3_11(158-174)Online publication date: 23-Apr-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
EICC '23: Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference
June 2023
205 pages
ISBN:9781450398299
DOI:10.1145/3590777
This work is licensed under a Creative Commons Attribution International 4.0 License.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 June 2023

Check for updates

Author Tags

  1. Bloom encoding
  2. DGA detection
  3. privacy-preserving data publishing
  4. sanitization

Qualifiers

  • Short-paper
  • Research
  • Refereed limited

Funding Sources

Conference

EICC 2023

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)182
  • Downloads (Last 6 weeks)16
Reflects downloads up to 07 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Towards Privacy-Preserving Machine Learning in Sovereign Data Spaces: Opportunities and ChallengesPrivacy and Identity Management. Sharing in a Digital World10.1007/978-3-031-57978-3_11(158-174)Online publication date: 23-Apr-2024

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media