2021
DOI: 10.1007/978-3-030-91356-4_13
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Malicious DNS Tunnel Tools from DoH Traffic Using Hierarchical Machine Learning Classification

Abstract: Although the DNS over HTTPS (DoH) protocol has desirable properties for Internet users such as privacy and security, it also causes a problem in that network administrators are prevented from detecting suspicious network traffic generated by malware and malicious tools. To support their efforts in maintaining network security, in this paper, we propose a novel system that identifies malicious DNS tunnel tools through a hierarchical classification method that uses machine-learning technology on DoH traffic. We … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 18 publications
0
9
0
Order By: Relevance
“…In our previous work [10], the implementation only recognized well-known malicious DNS tunnel tools, including dns2tcp, dnscat2, and iodine. However, there are a number of malicious DNS tunnel tools, such as ozymanDNS, DeNiSe, Heyoka, DNScapy, and many more.…”
Section: E Knowledge Updatementioning
confidence: 99%
See 1 more Smart Citation
“…In our previous work [10], the implementation only recognized well-known malicious DNS tunnel tools, including dns2tcp, dnscat2, and iodine. However, there are a number of malicious DNS tunnel tools, such as ozymanDNS, DeNiSe, Heyoka, DNScapy, and many more.…”
Section: E Knowledge Updatementioning
confidence: 99%
“…• The evaluation results confirm that the proposed system is able to recognize the six malicious DNS tunnel tools with high classification accuracy. This article is an extended version of our previous publication [10]. In the previous paper, the proposed system was able to identify the well-known malicious DNS tunnel tools but could not recognize the newly emerged ones.…”
Section: Introductionmentioning
confidence: 99%
“…According to the figure, the indicators of malicious activities include: Sudden spikes in DoH traffic: a sudden increase in network traffic could indicate malicious actors are using DoH to bypass DNS filters [ 14 ]. DoH traffic to suspicious domains: if a lot of DoH traffic goes to domains known to be associated with malware, phishing, or other types of malicious activity, it could be a sign that malicious actors are using DoH to access those domains [ 15 ]. Encrypted DoH traffic from known malware-infected hosts: if hosts on the network are known to be infected with malware, and encrypted DoH traffic is coming from those hosts, it could be a sign that the malware is using DoH to communicate with its command and control servers [ 16 ].…”
Section: Introductionmentioning
confidence: 99%
“…According to [6], [7] on the use of DNS TXT resource records, some types of bot programs have been identified as using DNS TXT resource records for botnet communication. In [8], [9], the authors proposed a machine-learning-based detection method of botnet communications using DNS over HTTPS protocol, which is a privacy enhancement of DNS. As a result, the DNS traffic which so far has been considered secure also has become a target of being monitored communication since the network administrators cannot simply block all DNS traffic.…”
Section: Introductionmentioning
confidence: 99%