Detecting Network Security Threats Using Domain Name System and NetFlow Traffic

被引:3
|
作者
Hananto, Rinkel [1 ]
Lim, Charles [1 ]
Ipung, Heru Purnomo [1 ]
机构
[1] Swiss German Univ, Fac Engn & Informat Technol, Kota Tangerang 15143, Banten, Indonesia
关键词
Botnet; DNS; DDoS; Information Entropy; NetFlow; Network Anomaly Detection; Network Security Threats; Traffic Correlation;
D O I
10.1145/3199478.3199505
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With more and more organization in the world rely on the Internet to do their business or activity, the malicious attackers are always looking for ways to penetrate in organization internal network to achieve their malicious goals. The malicious activities may include spam distribution, denial of service, adware, identity theft and many other security threats. Many of the security perimeter devices only able to detect network security threats from external, organization is left with many undetected or even unknown internal security threats. Many of these network security threats can be detected by monitoring and analyzing network traffic. One of the emerging threats is Domain Name System (DNS) Distributed Denial of Service (DDoS) attack, which flood the authoritative DNS server with large amount of DNS request. We introduce a new method to detect DDoS attack by using Netflow traffic as the early indicator of DDOS attacks and DNS traffic to validate the DNS DDOS attack. We also showed that by measuring statistical entropy of Netflow traffic and statistical values of DNS NXDOMAIN response, our proposed model could be used to detect either low volume or high volume DDoS attack.
引用
收藏
页码:105 / 109
页数:5
相关论文
共 50 条
  • [21] Network Traffic and Security Event Collecting System
    Son, Hee-Seung
    Lee, Jin-Heung
    Kim, Tae-Yong
    Lee, Sang-Gon
    PROCEEDINGS OF SECOND INTERNATIONAL CONFERENCE ON ELECTRICAL SYSTEMS, TECHNOLOGY AND INFORMATION 2015 (ICESTI 2015), 2016, 365 : 439 - 446
  • [22] Principle and design of computer network domain name system
    Yin, Changming
    Li, Feng
    Changsha Dianli Xueyuan Xuebao/Journal of Changsha University of Electric Power, 1998, 13 (01): : 25 - 29
  • [23] A Credible Food Traceability System Based on Domain Name System Security Extensions
    Liu, Yi
    Liu, Sha
    Wang, Junyu
    Qian, Kan
    Shi, Yiwei
    Zheng, Lirong
    Chen, Feng
    Kong, Ning
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (04) : 111 - 125
  • [24] Visual analysis of network traffic for resource planning, interactive monitoring, and interpretation of security threats
    Mansmann, Florian
    Keim, Daniel A.
    North, Stephen C.
    Rexroad, Brian
    Sheleheda, Daniel
    IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 2007, 13 (06) : 1105 - 1112
  • [25] Development of Automated System for Identifying Abnormal Network Activity and Detecting Threats
    Nikonov, V. V.
    Los', V. P.
    Ross, G. V.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2016, 50 (08) : 693 - 702
  • [26] Evaluation Framework for Netflow-based Network Anomaly Detection Systems using Synthetic Malicious Network Traffic
    Bardhan, Shuvo
    Hatada, Mitsuhiro
    2022 IEEE 46TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2022), 2022, : 1474 - 1480
  • [27] Comprehensive Review of Application Progress of Blockchain in Domain Name System Security
    Ji, Jie
    Yue, Pengfei
    Li, Leixiao
    Du, Jinze
    Lin, Hao
    Gao, Haoyu
    Computer Engineering and Applications, 2024, 60 (21) : 73 - 88
  • [28] Classification of Network Traffic Using Fuzzy Clustering for Network Security
    Fries, Terrence P.
    ADVANCES IN DATA MINING: APPLICATIONS AND THEORETICAL ASPECTS, ICDM 2017, 2017, 10357 : 278 - 285
  • [29] Detecting Anomalous Network Traffic Using Evidence Theory
    Mattar, Ahmed
    Reformat, Marek Z.
    ADVANCES IN FUZZY LOGIC AND TECHNOLOGY 2017, VOL 2, 2018, 642 : 493 - 504
  • [30] Analysis of Security Techniques for Detecting Suspicious Activities and Intrusion Detection in Network Traffic
    Department of Computer Sciences, City University of Science and Information Technology, Peshawar, Pakistan
    不详
    Int. J. Comput. Sci. Issues, 1600, 2 (259-265):