菜单

关于 🐙 GitHub
arXiv 提交日期: 2026-03-03
📄 Abstract - Gravity Falls: A Comparative Analysis of Domain-Generation Algorithm (DGA) Detection Methods for Mobile Device Spearphishing

Mobile devices are frequent targets of eCrime threat actors through SMS spearphishing (smishing) links that leverage Domain Generation Algorithms (DGA) to rotate hostile infrastructure. Despite this, DGA research and evaluation largely emphasize malware C2 and email phishing datasets, leaving limited evidence on how well detectors generalize to smishing-driven domain tactics outside enterprise perimeters. This work addresses that gap by evaluating traditional and machine-learning DGA detectors against Gravity Falls, a new semi-synthetic dataset derived from smishing links delivered between 2022 and 2025. Gravity Falls captures a single threat actor's evolution across four technique clusters, shifting from short randomized strings to dictionary concatenation and themed combo-squatting variants used for credential theft and fee/fine fraud. Two string-analysis approaches (Shannon entropy and Exp0se) and two ML-based detectors (an LSTM classifier and COSSAS DGAD) are assessed using Top-1M domains as benign baselines. Results are strongly tactic-dependent: performance is highest on randomized-string domains but drops on dictionary concatenation and themed combo-squatting, with low recall across multiple tool/cluster pairings. Overall, both traditional heuristics and recent ML detectors are ill-suited for consistently evolving DGA tactics observed in Gravity Falls, motivating more context-aware approaches and providing a reproducible benchmark for future evaluation.

顶级标签: systems machine learning model evaluation
详细标签: domain generation algorithm phishing detection mobile security benchmark threat detection 或 搜索:

引力陷阱:针对移动设备鱼叉式网络钓鱼的域名生成算法检测方法比较分析 / Gravity Falls: A Comparative Analysis of Domain-Generation Algorithm (DGA) Detection Methods for Mobile Device Spearphishing


1️⃣ 一句话总结

这篇论文通过分析一个名为Gravity Falls的新型短信钓鱼数据集,发现现有的传统和机器学习检测方法在应对不断演变的钓鱼域名生成策略时效果不佳,尤其是在处理字典拼接和主题组合抢注等复杂手法时表现较差,从而强调了开发更具情境感知能力的检测工具的必要性。

源自 arXiv: 2603.03270