Proceedings of the 11th Annual Cyber and Information Security Research Conference 2016
DOI: 10.1145/2897795.2897804
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Tunnels in PCAP Data by Random Forests

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 41 publications
(24 citation statements)
references
References 7 publications
0
24
0
Order By: Relevance
“…More recent work has focused on less specific tunneling tools using supervised learning. For example, Buczak et al [5] also detect tunneling, although not only Iodine. The proposed method uses two different types of PCAP files: with and without tunneling; the tunneling is performed by one of three tools.…”
Section: Related Workmentioning
confidence: 99%
“…More recent work has focused on less specific tunneling tools using supervised learning. For example, Buczak et al [5] also detect tunneling, although not only Iodine. The proposed method uses two different types of PCAP files: with and without tunneling; the tunneling is performed by one of three tools.…”
Section: Related Workmentioning
confidence: 99%
“…Using RF algorithm, Buczak et al [22] presented a model for preventing DNS tunneling. The proposed model has utilized the duration and size of the connections in order to initiate the feature space.…”
Section:  Issn: 2088-8708mentioning
confidence: 99%
“…Their work was based on an extensive year‐long analysis of malware datasets, and a near real‐time feed of passive DNS traffic. Anna and others [15] extracted features from the data set that employed a penetration testing effort within a DNS tunnel and trained random forest classifiers to distinguish normal DNS activity from tunneling activity. Aiello and others [16–19] have done extensive research on DNS tunnels.…”
Section: Related Workmentioning
confidence: 99%