Document Type
Article
Publication Date
2025
DOI
10.1109/OJCOMS.2025.3610784
Publication Title
IEEE Open Journal of the Communications Society
Volume
6
Pages
7823-7841
Abstract
Detecting malicious Internet domains is essential for safeguarding against various online threats. The current approach to detecting malicious domains (MDD) employs a graph neural network (GNN) method, which uses DNS logs to construct heterogeneous graphs for determining the maliciousness of unknown domains. Despite its success, this method is vulnerable to data poisoning attacks where an adversary can manipulate specific graph nodes to implant a backdoor into the model during training. To showcase the vulnerability, we propose a stealthy trigger injection attack on node features and graph structure in MDD, dubbed (STING). The attacker carefully manipulates selected features and edges of its nodes in the graph to create backdoor trigger patterns designed to evade detection by the MDD system, without knowing the model or other parts of the graph. Results from experiments conducted on real-world GNN-based MDD approaches show that the proposed attack is highly effective, with a success rate of over 88% in launching backdoor attacks and only a slight decrease in the model’s accuracy on legitimate domains (not exceeding 4%). Furthermore, the attack bypasses established defenses such as graph purification, adversarial training, and outlier detection, making it a major threat to the security of MDD systems. This study serves as a warning and stresses the importance of continuous vigilance and proactive efforts by both researchers and security experts to secure GNN-based MDD systems and maintain their trustworthiness and stability.
Rights
© 2025 The Authors.
This work is licensed under a Creative Commons Attribution 4.0 International (CC BY 4.0) License.
Original Publication Citation
Anan, M., Nazzal, M., Khreishah, A., Khalil, I., Phan, N., & Sawalmeh, A. (2025). STING: A stealthy backdoor attack on GNN-based malicious domain detection via DNS perturbations. IEEE Open Journal of the Communications Society, 6, 7823-7841. https://doi.org/10.1109/OJCOMS.2025.3610784
Repository Citation
Anan, M., Nazzal, M., Khreishah, A., Khalil, I., Phan, N., & Sawalmeh, A. (2025). STING: A stealthy backdoor attack on GNN-based malicious domain detection via DNS perturbations. IEEE Open Journal of the Communications Society, 6, 7823-7841. https://doi.org/10.1109/OJCOMS.2025.3610784
ORCID
0000-0003-3375-0310 (Nazzal)
Included in
Artificial Intelligence and Robotics Commons, Cybersecurity Commons, Information Security Commons, OS and Networks Commons