2013
DOI: 10.1007/978-3-642-38998-6_16
|View full text |Cite
|
Sign up to set email alerts
|

Flow-Based Detection of DNS Tunnels

Abstract: DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security breach can be misused for activities like free web browsing, but also for command & control traffic or cyber espionage, thus motivating the search for effective automated DNS tunnel detection techniques. In this paper we develop such a technique, based on the monitoring and analysis of network flows. Our methodology combines flow information with statistical methods for anomaly detection. The contribution of ou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 35 publications
(15 citation statements)
references
References 12 publications
0
15
0
Order By: Relevance
“…This is necessary to drive the feature selection made by the C4.5 decision tree classifier. Anomaly-based detection may be more adaptive than ML as it simply looks at sudden changes of flows statistics [4,13], while providing good detection rates [12]. A recent approach to DNS tunneling detection exploits anomaly-based analysis of flow statistics [12].…”
Section: Problem Formulationmentioning
confidence: 99%
See 3 more Smart Citations
“…This is necessary to drive the feature selection made by the C4.5 decision tree classifier. Anomaly-based detection may be more adaptive than ML as it simply looks at sudden changes of flows statistics [4,13], while providing good detection rates [12]. A recent approach to DNS tunneling detection exploits anomaly-based analysis of flow statistics [12].…”
Section: Problem Formulationmentioning
confidence: 99%
“…We consider the adoption of the Brodsky-Darkhovsky method as similarly carried out in [12]. We consider the adoption of the Brodsky-Darkhovsky method as similarly carried out in [12].…”
Section: Anomaly-based Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…This is a hard and important computational problem in cyber defence [2]. Specifically, we consider detecting tunnelling [3], [4] in the case where the attacker has obtained legitimate credentials. Because an attacker may be detectable if they do not follow existing connections, they must create tunnels from their entry point to the target.…”
Section: Introductionmentioning
confidence: 99%