2023
DOI: 10.1109/tnsm.2022.3215681
|View full text |Cite
|
Sign up to set email alerts
|

Malicious DNS Tunnel Tool Recognition Using Persistent DoH Traffic Analysis

Abstract: DNS over HTTPS (DoH) protocol can mitigate the risk of privacy breaches but makes it difficult to control network security services due to the DNS traffic encryption. However, since malicious DNS tunnel tools for the DoH protocol pose network security threats, network administrators need to recognize malicious communications even after the DNS traffic encryption has become widespread. In this paper, we propose a malicious DNS tunnel tool recognition system using persistent DoH traffic analysis based on machine… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…Therefore, the users may lose some security filtering as the cost of privacy protection with DoH. To solve this problem, we have to develop new security systems using techniques such as machine learning [8].…”
Section: Proposed Methods Protect Protectmentioning
confidence: 99%
“…Therefore, the users may lose some security filtering as the cost of privacy protection with DoH. To solve this problem, we have to develop new security systems using techniques such as machine learning [8].…”
Section: Proposed Methods Protect Protectmentioning
confidence: 99%
“…In [ 34 ], authors explored the classification of DNS over HTTPS communication. The majority of linked works make use of various dataset properties.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Although cryptographic technologies could conceal users' identity information, it was still possible to trace the traces generated by users when accessing different applications by mining the potential features of the traffic. Among these, statistical features, as a commonly used method for representing potential features of traffic through mining, were widely employed in the field of traffic identification [3][4][5][6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%