Overview
Risk patterns
Patterns found in the case record and its linked vulnerabilities.
- 1Dominant ATLAS tactic. Resource Development appears in 2 case steps.
- 2Multiple attack methods. The case connects to 6 unique AI attack methods.
Procedure timeline
Search the case steps or filter them by attacker goal.
-
Reconnaissance DGA detection is a widely used technique to detect botnets in academia and industry. The research team searched for research papers related to DGA detection.
-
Resource Development The researchers acquired a publicly available CNN-based DGA detection model and tested it against a well-known DGA generated domain name data sets, which includes ~50 million domain names from 64 botnet DGA families. The CNN-based DGA detection model shows more than 70% detection accuracy on 16 (~25%) botnet DGA families.
-
Resource Development
Step 3
Adversarial AI Attacks
The researchers developed a generic mutation technique that requires a minimal number of iterations.
-
AI Attack Staging
Step 4
Black-Box Optimization
The researchers used the mutation technique to generate evasive domain names.
-
AI Attack Staging
Step 5
Verify Attack
The experiment results show that the detection rate of all 16 botnet DGA families drop to less than 25% after only one string is inserted once to the DGA generated domain names.
-
Defense Evasion
Step 6
Evade AI Model
The DGA generated domain names mutated with this technique successfully evade the target DGA Detection model, allowing an adversary to continue communication with their Command and Control servers.
Mitigations
Defenses connected to the attack methods in this case.
Sources
Original public records and references for this case.
Original source
Original source links
Open the MITRE ATLAS data and public references used for this case study.