To advance research on Detecting domain generation algorithms (DGA) generated domain name and to enable a comparison of different detection approaches, we make the dataset, AmritaDGA from our project Detecting malicious domain names publicy available. AmritaDGA data set is avilable for research. This data set is used as part of DMD2018 organized by Cybersecurity group at CEN as part of ICACCI'18 and SSCC'18. The baseline system and detailed statistics of the data set is avilable here. You can find more details on the dataset in the DMD2018 System Description paper.
We are happy to share our AmritaDGA dataset. However, in order to prevent any misuse, we kindly ask you to send us a mail to vinayakumarr77[at]gmail.com stating your identity and research scope. We will then send you the login credentials.
-
If you are a student, please ask your advisor to send us an email for the access. If you are a faculty, please send us the email from your university's email account.
-
In your email, please include your name, affiliation, and homepage The information is needed for verification purpose. Note that your request may be ignored if we are not able to determine your identity or affiliation.
-
Please send us an email from your company's email account. Please briefly introduce yourself (e.g., name) and your company in that mail.
-
Please also attach a justification letter (PDF) in official letterhead. The justification letter needs to acknowledge the Detecting Malicious Domain Names project from the Amrita Vishwa Vidyapeetham, Coimbatore and state clearly the reasons why the dataset is being requested. Also, acknowledge that the dataset will not be shared to others without our permission.
If you use this data set as part of your research, please cite the following papers.
- Vinayakumar R, Soman KP, Prabaharan Poornachandran, Mamoun Alazab, and Sabu M. Thampi, [AmritaDGA: A Comprehensive Data set for Domain Generation Algorithms (DGAs)] (https://www.researchgate.net/publication/334570954_AmritaDGA_a_comprehensive_data_set_for_domain_generation_algorithms_DGAs_based_domain_name_detection_systems_and_application_of_deep_learning) In Big Data Recommender Systems: Recent Trends and Advances, Institution of Engineering and Technology (IET)
-
Vinayakumar, R., Poornachandran, P., & Soman, K. P. (2018). Scalable Framework for Cyber Threat Situational Awareness Based on Domain Name Systems Data Analysis. In Big Data in Engineering Applications (pp. 113-142). Springer, Singapore.
-
Vinayakumar, R., Soman, K. P., Poornachandran, P. & Pradeep Menon A deep-dive on Machine learning for Cybersecurity use cases. Machine Learning for Computer and Cyber Security: Principle, Algorithms, and Practices, CRC press [In Press]
-
Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2018). Detecting malicious domain names using deep learning approaches at scale. Journal of Intelligent & Fuzzy Systems, 34(3), 1355-1367.
-
Vinayakumar, R., Soman, K. P., Poornachandran, P., & Sachin Kumar, S. (2018). Evaluating deep learning approaches to characterize and classify the DGAs at scale. Journal of Intelligent & Fuzzy Systems, 34(3), 1265-1276.
-
Vinayakumar R, Soman KP, Prabaharan Poornachandran, Vysakh S Mohan, Amara Dinesh, ScaleNet: Scalable and Hybrid Framework for Cyber Threat Situational Awareness based on DNS, URL, and Email Data Analysis. In Journal of Cyber Security and Mobility
-
Mohan, V. S., Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2018, May). Spoof net: Syntactic patterns for identification of ominous online factors. In 2018 IEEE Security and Privacy Workshops (SPW) (pp. 258-263). IEEE.
- IIT Kanpur
- Savitribai Phule Pune University
- karpagam college of engineering, Coimbatore
- SSN College of Engineering, Coimbatore
- Punjabi University, Patiala
- University of Washington, Tacoma
- Vidya Academy of Science & Technology, Thrissur
- PES University, India
- Vellore Institute of Technology, Chennai
- Mangalore University
- University of Pisa
- Amrita school of engineering, Coimbatore
- Ben-Gurion University, Beersheba, Israel
- CMC InfoSec Corp, VietNam
- Akamai Technologies
- Department of Communications and Information Engineering, University of Murcia (Spain)
- Kansas State University, Manhattan
- University of Science and Technology Houari Boumediene, University in Bab Ezzouar, Algeria
- Georgia Institute of Technology, Atlanta, Georgia
- Xidian University, China
- Graduate School of Information Security, Korea University
- University of Gloucestershire, England.
- Shahrood University of Technology, Iran.
- NMIMS University,Mumbai, India.
- Center for Cybersecurity, Rochester Institute of Technology, USA.
- Ramaiah Institute of Technology, Bengaluru, India.
- Tsinghua University, Beijing, China.
- University of Chinese Academy of Sciences, China.
- National Institute of Technology Karnataka Surathkal, India.
- University of Sharjah, United Arab Emirates.
- Graduate University of Science and Technology, Vietnam.
- Hitachi Systems Security Inc (HISYS-SEC), Blainville (QUÉBEC), Canada.
- University of Chinese Academy of Sciences, Beijing, China.
- Kumamoto University, Japan
- TIFAC CORE in Cyber Security - Amrita Vishwa Vidyapeetham, Coimbatore, India
Having trouble with Pages? Check out here, Cybersecurity-Lab-at-CEN, CEN, Amrita Vishwa Vidyapeetham