Shared task on Detecting Malicious Domain names (DMD 2018)

a workshop co-located with ICACCI'18 and SSCC'18

Call for participation

We welcome you to participate in the Domain Generation Algorithms (DGAs) generated domain name detection and classification shared task track at DMD 2018. While registering make sure that the name of the team is kept as title and a short description of your approach is also provided as abstract. . The shared task features problem statements in the field of traditional machine learning, deep learning and text analysis in Cyber Security. Participants are advised to register as soon as possible in order to receive the training and testing datasets as per the schedule.

The participants will receive an unbalanced dataset for the first subtask, so design your model accordingly. The testing data will be provided one day before the deadline. We require all the participants to submit their trained model and the results obtained on the test data provided by us. All the participants who submit their work are welcome to present their model at DMD 2018.

All accepted papers will be published by Springer in Communications in Computer and Information Science Series(CCIS), ISSN: 1865:0929. The proceedings will be available via the SpringerLink digital library. CCIS is abstracted/indexed in DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago and Scopus. CCIS volumes are also submitted for the inclusion in ISI Proceedings. The current SCImago Journal Rank (SJR) of CCIS is 0.162 (H Index 29).

Extended version of the best working notes and workshop papers will be submitted to the book.This book will be published in Advanced Sciences and Technologies for Security Applications, Springer.

Tasks

  1. The Sub task1 is to identify the DGA generated domain name.
  2. The Sub task 2 is to detect and categorize the DGA generated domain name to their botnet family.

Corpus

We have provided a few examples of the benign and DGA generated domain name

Benign domain samples

Top ranked domain names

DGA DOMAIN NAME SAMPLES

Domain names are generated using DGA

Registration

Registration is closed

For any questions, please contact the workshop organizers at: dmd2018[at]cb.amrita.edu

Call for papers (as part of ICACCI'18 and SSCC'18)

Deep learning for Security Applications (Topics of interest include (but are not limited to)):
  • Botnet identification and detection
  • Spam and phishing detection
  • Security in social networks
  • Learning in adversarial environments
  • Malware identification, analysis and similarity
  • Intrusion detection and response
  • Representation and detection of social engineering attacks
  • Classification of sequences of system and network events
  • Application of learning to computer forensics
  • Program representation
  • Web application
  • Security, Privacy, Trust and Safety
  • Mobile Computing, Internet of Things (IoT)
  • Cloud, Apps and Services, and their Security
  • Big Data architectures for network security
  • Detecting data and information leakage

All accepted papers will be published by Springer in Communications in Computer and Information Science Series(CCIS), ISSN: 1865:0929. The proceedings will be available via the SpringerLink digital library. CCIS is abstracted/indexed in DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago and Scopus. CCIS volumes are also submitted for the inclusion in ISI Proceedings. The current SCImago Journal Rank (SJR) of CCIS is 0.162 (H Index 29).

Participants can submit their papers through EDAS. The paper submission guidelines avilable here.

Important Dates - Shared task

Event Date
Registration due June 15th June 28th (Hard Deadline)For more details contact vinayakumarr77[at]gmail.com
Training data released June 23rd
Test data release July 15th
Model and Results Submission July 17th
Results declared July 19th
Working notes due July 25th
Conference Sep 20

Important Dates - Call for papers

Event Date
Papers Due May 31, 2018 (Full Paper Submission Date has been Extended June 30, 2018)
Acceptance Notification June 30, 2018
Final Paper Deadline August 20, 2018

Keynote Speakers

Rajshekhar Biradar is a Software Application Engineer working in the area of deep learning and cybersecurity with Extreme Networks. He is currently working on building Deep Learning based IoT security solution. His research interests include Networking, Machine Learning, Computer Vision and Natural Language Processing.
Cinque Terre

Talk description: IoT Security is becoming more challenging because of diverse set of devices with limited resources, long lifecycles, and proprietary protocols. Also, IoT products are often sold with old and unpatched embedded operating systems and software. Hence, focusing security only at edge (IoT) is not feasible. There is a need to shift the focus of IoT security from IoT devices to centralized/distributed deep learning models for overall security of the network. Contents of Session would include understanding general terms and background of deep learning, quick introduction to Sony’s nnabla framework and discuss various application's of deep learning in cyber-security in general with special focus on IoT security.

Results

Baseline system for both Task 1 and Task 2 avilable here

Download multi-class classification Task 2 results here

Download binary-class classification Task 1 results here

COMMITTEES

organizing and Technical Program committee


Prof Soman KP, Prof & Head CEN
Prof Bharat Jayaraman, University at Buffalo
Dr. Sabu M. Thampi, Associate Professor, IIITM-K
Dr Mamoun Alazab, Senior member IEEE and Senior Lecturer (Associate Professor in North America)
Dr MingJian Tang, Data Scientist (Cyber Security), Commonwealth Bank, Australia
Dr. Rakesh Verma, Professor, University of Houston
Dr. Lila Ghemri, Associate Professor Texas Southern University, Houston
Dr. Stavros Ntalampiras,, Assistant Professor, Department of Computer Science of the University of Milan.
Dr. Yassine Maleh, Hassan 1st University, Morocco
Dr. M. Sabarimalai Manikandan, Indian Institute of Technology, Bhubaneswar
Dr. B. B. Gupta, National Institute of Technology Kurukshetra, India
Dr. Sandeep K. Shukla,, , Professor, Department of Computer Science and Engineering, Indian Institute of Technology, Kanpur
Dr. Prabaharan Poornachandran, Center for Cyber Security Systems and Networks, Amrita Vishwa Vidyapeetham, Kollam, India
Mr. Pradeep Menon, Chief executive officer, Lakhshya Cyber Security Labs Pvt Ltd, Coimbatore

Student Organizers

Vinayakumar R, Research Scholar, CEN, Amrita Vishwa Vidyapeetham
Anu V, Research Assistant, CEN, Amrita Vishwa Vidyapeetham
Harikrishnan NB, MTech student, CEN, Amrita Vishwa Vidyapeetham
Amara Dinesh Kumar, MTech student, Amrita Vishwa Vidyapeetham

Advisory committee


Mrs. Sowmya V., CEN, Amrita Vishwa Vidyapeetham
Dr. E. A. Gopalakrishnan, CEN, Amrita Vishwa Vidyapeetham
Mr. Vijay Krishnan Menon ,CEN,Amrita Vishwa Vidyapeetham
Dr. Anand Kumar M, CEN, Amrita Vishwa Vidyapeetham, Coimbatore, India
Dr. Govind D , CEN, Amrita Vishwa Vidyapeetham
Dr. Shanmugha Sundaram G. A, CEN, Amrita Vishwa Vidyapeetham
Dr. Geetha Srikanth , CEN, Amrita Vishwa Vidyapeetham
Mr. Sajith Variyar V. V, CEN, Amrita Vishwa Vidyapeetham

References

A deep-dive on Machine learning for Cybersecurity use cases, Vinayakumar R, Soman KP, Prabaharan Poornachandran and Pradeep Menon [MLCCS 2018 Book chapter Accepted]

S.P.O.O.F Net: Syntactic Patterns for identification of Ominous Online Factors, Vysakh S Mohan, Vinayakumar R, Soman Kp and Prabaharan Poornachandran [BioSTAR 2018]

Scalable Framework for Cyber Threat Situational Awareness based on Domain Name Systems Data Analysis, Vinayakumar R, Prabaharan Poornachandran and Soman KP [Book Chapter -Springer]

Detecting Malicious Domain Names using Deep Learning Approaches at Scale, Vinayakumar R, Soman KP, and Prabaharan Poornachandran [Journal-IOS Press]

Evaluating Deep Learning Approaches to Characterize and Classify the DGAs at Scale, Vinayakumar R, Soman KP, Prabaharan Poornachandran and Sachin Kumar S [Journal-IOS Press]