Malicious DNS Tunnel Tool Recognition Using Persistent DoH Traffic Analysis

被引:7
|
作者
Mitsuhashi, Rikima [1 ,2 ]
Jin, Yong [3 ]
Iida, Katsuyoshi [2 ]
Shinagawa, Takahiro [4 ]
Takai, Yoshiaki [2 ]
机构
[1] Univ Tokyo, Informat Technol Ctr, Tokyo 1138658, Japan
[2] Hokkaido Univ, Informat Initiat Ctr, Sapporo 0600811, Japan
[3] Tokyo Inst Technol, Global Sci Informat & Comp Ctr, Tokyo 1528550, Japan
[4] Univ Tokyo, Informat Initiat Ctr, Tokyo 1138658, Japan
关键词
DNS over HTTPS (DoH); network traffic clas-sification; machine learning methods; gradient boosting decision tree algorithm; GBDT algorithm; suspicious DoH traffic; emerg-ing malicious DNS tunnel tool recognition; CIRA-CICDoHBrw-2020; DoH-Tunnel-Traffic-HKD;
D O I
10.1109/TNSM.2022.3215681
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
DNS over HTTPS (Do) can mitigate the risk of privacy breaches but makes it difficult to control network security services due to the DNS traffic encryption. However, since malicious DNS tunnel tools for the DoH protocol pose network security threats, network administrators need to recognize malicious communications even after the DNS traffic encryption has become widespread. In this paper, we propose a malicious DNS tunnel tool recognition system using persistent DoH traffic analysis based on machine learning. The proposed system can accomplish continuous knowledge updates for emerging malicious DNS tunnel tools on the machine learning model. The system is based on hierarchical machine learning classification and focuses on DoH traffic analysis. The evaluation results confirm that the proposed system is able to recognize the six malicious DNS tunnel tools in total, not only well-known ones, including dns2tcp, dnscat2, and iodine, but also the emerging ones such as dnstt, tcp-over-dns, and tuns with 98.02% classification accuracy.
引用
收藏
页码:2086 / 2095
页数:10
相关论文
共 50 条
  • [1] Identifying Malicious DNS Tunnel Tools from DoH Traffic Using Hierarchical Machine Learning Classification
    Mitsuhashi, Rikima
    Satoh, Akihiro
    Jin, Yong
    Iida, Katsuyoshi
    Shinagawa, Takahiro
    Takai, Yoshiaki
    INFORMATION SECURITY (ISC 2021), 2021, 13118 : 238 - 256
  • [2] Classifying DNS Tunneling Tools For Malicious DoH Traffic
    Alenezi, Rafa
    Ludwig, Simone A.
    2021 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI 2021), 2021,
  • [3] Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition
    Sepideh Niktabe
    Arash Habibi Lashkari
    Dilli Prasad Sharma
    International Journal of Information Security, 2024, 23 : 1293 - 1316
  • [4] Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition
    Niktabe, Sepideh
    Lashkari, Arash Habibi
    Sharma, Dilli Prasad
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (02) : 1293 - 1316
  • [5] Classifying Malicious Domains using DNS Traffic Analysis
    Mahdavifar, Samaneh
    Maleki, Nasim
    Lashkari, Arash Habibi
    Broda, Matt
    Razavi, Amir H.
    2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021, 2021, : 60 - 67
  • [6] Real time detection of malicious DoH traffic using statistical analysis
    Moure-Garrido, Marta
    Campo, Celeste
    Garcia-Rubio, Carlos
    COMPUTER NETWORKS, 2023, 234
  • [7] Malicious Traffic Detection in DNS over HTTPS (DoH): Edge Prediction with Graph Convolutional Network
    Boonyakorn, Pongsarun
    Changsan, Ukid
    2024 INTERNATIONAL TECHNICAL CONFERENCE ON CIRCUITS/SYSTEMS, COMPUTERS, AND COMMUNICATIONS, ITC-CSCC 2024, 2024,
  • [8] DNS Traffic Analysis for Malicious Domains Detection
    Ghafir, Ibrahim
    Prenosil, Vaclav
    2ND INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN) 2015, 2015, : 613 - 618
  • [9] Malicious DNS Traffic in Tor: Analysis and Countermeasures
    Sonntag, Michael
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 536 - 543
  • [10] Unveiling DoH tunnel: Toward generating a balanced DoH encrypted traffic dataset and profiling malicious behavior using inherently interpretable machine learning
    Niktabe, Sepideh
    Lashkari, Arash Habibi
    Roudsari, Arousha Haghighian
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (01) : 507 - 531