Malicious DNS Tunnel Tool Recognition Using Persistent DoH Traffic Analysis

被引:7
|
作者
Mitsuhashi, Rikima [1 ,2 ]
Jin, Yong [3 ]
Iida, Katsuyoshi [2 ]
Shinagawa, Takahiro [4 ]
Takai, Yoshiaki [2 ]
机构
[1] Univ Tokyo, Informat Technol Ctr, Tokyo 1138658, Japan
[2] Hokkaido Univ, Informat Initiat Ctr, Sapporo 0600811, Japan
[3] Tokyo Inst Technol, Global Sci Informat & Comp Ctr, Tokyo 1528550, Japan
[4] Univ Tokyo, Informat Initiat Ctr, Tokyo 1138658, Japan
关键词
DNS over HTTPS (DoH); network traffic clas-sification; machine learning methods; gradient boosting decision tree algorithm; GBDT algorithm; suspicious DoH traffic; emerg-ing malicious DNS tunnel tool recognition; CIRA-CICDoHBrw-2020; DoH-Tunnel-Traffic-HKD;
D O I
10.1109/TNSM.2022.3215681
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
DNS over HTTPS (Do) can mitigate the risk of privacy breaches but makes it difficult to control network security services due to the DNS traffic encryption. However, since malicious DNS tunnel tools for the DoH protocol pose network security threats, network administrators need to recognize malicious communications even after the DNS traffic encryption has become widespread. In this paper, we propose a malicious DNS tunnel tool recognition system using persistent DoH traffic analysis based on machine learning. The proposed system can accomplish continuous knowledge updates for emerging malicious DNS tunnel tools on the machine learning model. The system is based on hierarchical machine learning classification and focuses on DoH traffic analysis. The evaluation results confirm that the proposed system is able to recognize the six malicious DNS tunnel tools in total, not only well-known ones, including dns2tcp, dnscat2, and iodine, but also the emerging ones such as dnstt, tcp-over-dns, and tuns with 98.02% classification accuracy.
引用
收藏
页码:2086 / 2095
页数:10
相关论文
共 50 条
  • [21] Unveiling malicious DNS behavior profiling and generating benchmark dataset through application layer traffic analysis
    Shafi, Mohammadmoein
    Lashkari, Arash Habibi
    Mohanty, Hardhik
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 118
  • [22] A Graph Theoretical Analysis of the Web Using DNS Traffic Traces
    Sanders, Sean
    Kaur, Jasleen
    2015 IEEE 23RD INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS, AND SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (MASCOTS 2015), 2015, : 11 - 14
  • [23] A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach
    Abu Al-Haija, Qasem
    Alohaly, Manar
    Odeh, Ammar
    SENSORS, 2023, 23 (07)
  • [24] Mining agile DNS traffic using graph analysis for cybercrime detection
    Berger, Andreas
    D'Alconzo, Alessandro
    Gansterer, Wilfried N.
    Pescape, Antonio
    COMPUTER NETWORKS, 2016, 100 : 28 - 44
  • [25] A Cognitive Multifractal Approach to Characterize Complexity of Non-Stationary and Malicious DNS Data Traffic Using Adaptive Sliding Window
    Khan, Muhammad Salman
    Ferens, Ken
    Kinsner, Witold
    PROCEEDINGS OF 2015 IEEE 14TH INTERNATIONAL CONFERENCE ON COGNITIVE INFORMATICS & COGNITIVE COMPUTING (ICCI*CC), 2015, : 76 - 83
  • [26] Detection of DGA-based Malware Communications from DoH Traffic Using Machine Learning Analysis
    Mitsuhashi, Rikima
    Jin, Yong
    Iida, Katsuyoshi
    Shinagawa, Takahiro
    Takai, Yoshiaki
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [27] Universal Network Traffic Analysis for Malicious Traffic Detection using RappNet: A Privacy-Preserving Approach
    Barut, Onur
    Deng, Lulin
    Lu, David
    2023 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS, 2023,
  • [28] Android Malicious Application Detection Using Permission Vector and Network Traffic Analysis
    Kandukuru, Satish
    Sharma, R. M.
    2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 1126 - 1132
  • [29] Capture and Analysis of Malicious Traffic in VoIP Environments Using a Low Interaction Honeypot
    Vargas, I. R. J. S.
    Kleinschmidt, J. H.
    IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (03) : 777 - 783
  • [30] DBod: Clustering and detecting DGA-based botnets using DNS traffic analysis
    Wang, Tzy-Shiah
    Lin, Hui-Tang
    Cheng, Wei-Tsung
    Chen, Chang-Yu
    COMPUTERS & SECURITY, 2017, 64 : 1 - 15