We welcome you to participate in the Domain Generation Algorithms (DGAs) generated domain name detection and classification shared task track at DMD 2018. While registering make sure that the name of the team is kept as title and a short description of your approach is also provided as abstract. . The shared task features problem statements in the field of traditional machine learning, deep learning and text analysis in Cyber Security. Participants are advised to register as soon as possible in order to receive the training and testing datasets as per the schedule.
The participants will receive an unbalanced dataset for the first subtask, so design your model accordingly. The testing data will be provided one day before the deadline. We require all the participants to submit their trained model and the results obtained on the test data provided by us. All the participants who submit their work are welcome to present their model at DMD 2018.
All accepted papers will be published by Springer in Communications in Computer and Information Science Series(CCIS), ISSN: 1865:0929. The proceedings will be available via the SpringerLink digital library. CCIS is abstracted/indexed in DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago and Scopus. CCIS volumes are also submitted for the inclusion in ISI Proceedings. The current SCImago Journal Rank (SJR) of CCIS is 0.162 (H Index 29).
Extended version of the best working notes and workshop papers will be submitted to the book.This book will be published in Advanced Sciences and Technologies for Security Applications, Springer.
We have provided a few examples of the benign and DGA generated domain name
Top ranked domain names
Domain names are generated using DGA
Registration is closed
For any questions, please contact the workshop organizers at: dmd2018[at]cb.amrita.edu
All accepted papers will be published by Springer in Communications in Computer and Information Science Series(CCIS), ISSN: 1865:0929. The proceedings will be available via the SpringerLink digital library. CCIS is abstracted/indexed in DBLP, Google Scholar, EI-Compendex, Mathematical Reviews, SCImago and Scopus. CCIS volumes are also submitted for the inclusion in ISI Proceedings. The current SCImago Journal Rank (SJR) of CCIS is 0.162 (H Index 29).
Participants can submit their papers through EDAS. The paper submission guidelines avilable here.
Event | Date |
---|---|
Registration due | |
Training data released | |
Test data release | |
Model and Results Submission | |
Results declared | |
Working notes due | |
Conference | Sep 20 |
Event | Date |
---|---|
Papers Due | |
Acceptance Notification | |
Final Paper Deadline |
Talk description: IoT Security is becoming more challenging because of diverse set of devices with limited resources, long lifecycles, and proprietary protocols. Also, IoT products are often sold with old and unpatched embedded operating systems and software. Hence, focusing security only at edge (IoT) is not feasible. There is a need to shift the focus of IoT security from IoT devices to centralized/distributed deep learning models for overall security of the network. Contents of Session would include understanding general terms and background of deep learning, quick introduction to Sony’s nnabla framework and discuss various application's of deep learning in cyber-security in general with special focus on IoT security.
Prof Soman KP, Prof & Head CEN |
Prof Bharat Jayaraman, University at Buffalo |
Dr. Sabu M. Thampi, Associate Professor, IIITM-K |
Dr Mamoun Alazab, Senior member IEEE and Senior Lecturer (Associate Professor in North America) |
Dr MingJian Tang, Data Scientist (Cyber Security), Commonwealth Bank, Australia |
Dr. Rakesh Verma, Professor, University of Houston |
Dr. Lila Ghemri, Associate Professor Texas Southern University, Houston |
Dr. Stavros Ntalampiras,, Assistant Professor, Department of Computer Science of the University of Milan. |
Dr. Yassine Maleh, Hassan 1st University, Morocco |
Dr. M. Sabarimalai Manikandan, Indian Institute of Technology, Bhubaneswar |
Dr. B. B. Gupta, National Institute of Technology Kurukshetra, India |
Dr. Sandeep K. Shukla,, , Professor, Department of Computer Science and Engineering, Indian Institute of Technology, Kanpur |
Dr. Prabaharan Poornachandran, Center for Cyber Security Systems and Networks, Amrita Vishwa Vidyapeetham, Kollam, India |
Mr. Pradeep Menon, Chief executive officer, Lakhshya Cyber Security Labs Pvt Ltd, Coimbatore |
Student OrganizersVinayakumar R, Research Scholar, CEN, Amrita Vishwa Vidyapeetham |
Anu V, Research Assistant, CEN, Amrita Vishwa Vidyapeetham |
Harikrishnan NB, MTech student, CEN, Amrita Vishwa Vidyapeetham |
Amara Dinesh Kumar, MTech student, Amrita Vishwa Vidyapeetham |
Mrs. Sowmya V., CEN, Amrita Vishwa Vidyapeetham |
Dr. E. A. Gopalakrishnan, CEN, Amrita Vishwa Vidyapeetham |
Mr. Vijay Krishnan Menon ,CEN,Amrita Vishwa Vidyapeetham |
Dr. Anand Kumar M, CEN, Amrita Vishwa Vidyapeetham, Coimbatore, India |
Dr. Govind D , CEN, Amrita Vishwa Vidyapeetham |
Dr. Shanmugha Sundaram G. A, CEN, Amrita Vishwa Vidyapeetham |
Dr. Geetha Srikanth , CEN, Amrita Vishwa Vidyapeetham |
Mr. Sajith Variyar V. V, CEN, Amrita Vishwa Vidyapeetham |
A deep-dive on Machine learning for Cybersecurity use cases, Vinayakumar R, Soman KP, Prabaharan Poornachandran and Pradeep Menon [MLCCS 2018 Book chapter Accepted]
S.P.O.O.F Net: Syntactic Patterns for identification of Ominous Online Factors, Vysakh S Mohan, Vinayakumar R, Soman Kp and Prabaharan Poornachandran [BioSTAR 2018]
Scalable Framework for Cyber Threat Situational Awareness based on Domain Name Systems Data Analysis, Vinayakumar R, Prabaharan Poornachandran and Soman KP [Book Chapter -Springer]
Detecting Malicious Domain Names using Deep Learning Approaches at Scale, Vinayakumar R, Soman KP, and Prabaharan Poornachandran [Journal-IOS Press]
Evaluating Deep Learning Approaches to Characterize and Classify the DGAs at Scale, Vinayakumar R, Soman KP, Prabaharan Poornachandran and Sachin Kumar S [Journal-IOS Press]