skip to main content
10.1145/2666652.2666659acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
abstract

Detecting Malicious Domains via Graph Inference

Published: 07 November 2014 Publication History

Abstract

No abstract available.

References

[1]
J. Pearl. Reverend Bayes on inference engines: a distributed hierarchical approach. In in Proceedings of the National Conference on Artificial Intelligence, 1982.
[2]
J. Yedida, W. Freeman, and Y. Weiss. Understanding Belief Propagation and its Generalizations. Exploring Artificial Intelligence in the New Millennium, 2003.

Cited By

View all
  • (2025)RMD-Graph: Adversarial Attacks Resisting Malicious Domain Detection Based on Dual DenoisingIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2024.352079837:3(1394-1410)Online publication date: Mar-2025
  • (2024)Detection of Malicious Domains With Concept Drift Using Ensemble LearningIEEE Transactions on Network and Service Management10.1109/TNSM.2024.343551621:6(6796-6809)Online publication date: Dec-2024
  • (2024)Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00006(1236-1254)Online publication date: 19-May-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
AISec '14: Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop
November 2014
134 pages
ISBN:9781450331531
DOI:10.1145/2666652
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 November 2014

Check for updates

Author Tags

  1. belief propagation
  2. big data analytics
  3. graph inference
  4. malicious domain detection

Qualifiers

  • Abstract

Conference

CCS'14
Sponsor:

Acceptance Rates

AISec '14 Paper Acceptance Rate 12 of 24 submissions, 50%;
Overall Acceptance Rate 94 of 231 submissions, 41%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)26
  • Downloads (Last 6 weeks)1
Reflects downloads up to 25 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)RMD-Graph: Adversarial Attacks Resisting Malicious Domain Detection Based on Dual DenoisingIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2024.352079837:3(1394-1410)Online publication date: Mar-2025
  • (2024)Detection of Malicious Domains With Concept Drift Using Ensemble LearningIEEE Transactions on Network and Service Management10.1109/TNSM.2024.343551621:6(6796-6809)Online publication date: Dec-2024
  • (2024)Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00006(1236-1254)Online publication date: 19-May-2024
  • (2024)Detecting and Exploring Malicious Websites through Multi-Message Passing Heterogeneous Neural Network2024 IEEE Symposium on Computers and Communications (ISCC)10.1109/ISCC61673.2024.10733612(1-7)Online publication date: 26-Jun-2024
  • (2024)MC-Det: Multi-channel representation fusion for malicious domain name detectionComputer Networks10.1016/j.comnet.2024.110847255(110847)Online publication date: Dec-2024
  • (2023)EDoG: Adversarial Edge Detection For Graph Neural Networks2023 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML)10.1109/SaTML54575.2023.00027(291-305)Online publication date: Feb-2023
  • (2023)Insider Intrusion Detection Techniques: A State-of-the-Art ReviewJournal of Computer Information Systems10.1080/08874417.2023.217533764:1(106-123)Online publication date: 14-Feb-2023
  • (2022)Research on DNS anomaly detection technology based on multiple featuresJournal of Shenzhen University Science and Engineering10.3724/SP.J.1249.2020.9903637:Z1(36-43)Online publication date: 14-Oct-2022
  • (2022)Phishing URL DetectionProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3560615(1769-1782)Online publication date: 7-Nov-2022
  • (2022)Content-Agnostic Detection of Phishing Domains using Certificate Transparency and Passive DNSProceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3545948.3545958(446-459)Online publication date: 26-Oct-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media