Proceedings of the 16th International Conference on Availability, Reliability and Security 2021
DOI: 10.1145/3465481.3470089
|View full text |Cite
|
Sign up to set email alerts
|

Network Flow Entropy for Identifying Malicious Behaviours in DNS Tunnels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…Table VII and Table VIII compare the performances of the proposed system and those of the previous studies [28], [31] 0.992 0.99 1.0 0.99 [29], [30], [31], [32], [33]. These tables show the results of cross-validation and hold-out, respectively.…”
Section: E Well-known Malicious Dns Tunnel Tool Recognitionmentioning
confidence: 88%
See 1 more Smart Citation
“…Table VII and Table VIII compare the performances of the proposed system and those of the previous studies [28], [31] 0.992 0.99 1.0 0.99 [29], [30], [31], [32], [33]. These tables show the results of cross-validation and hold-out, respectively.…”
Section: E Well-known Malicious Dns Tunnel Tool Recognitionmentioning
confidence: 88%
“…In their experiments, the former filtering obtained an F-score of 99.3%, and the latter detection resulted in an F-score of 99.9%. Y. Khodjaeva et al [29] used statistical features extracted from traffic flows by several tools, such as Argus, DoHlyzer, and Tranalyzer2. They obtained an F-score of 93.5% by Random Forest in classifying DoH traffic as normal and malicious.…”
Section: B Doh Traffic Classificationmentioning
confidence: 99%
“…In this paper, we extend our previous research on detecting tunnelling and exfiltration behaviours in DoH traffic via optimization of the network traffic flow inspection-based approach, where the statistical flow features are augmented with the entropy of the network flow [34]. This augmented feature set is then used with ML classifiers to detect the malicious DNS tunnels.…”
Section: Methodsmentioning
confidence: 94%
“…Taking all these factors into account, researchers have started to explore host-based and network-based monitoring for DoH protocol analysis [30]. To this end, some recent works have evaluated the use of Machine Learning (ML), entropy, and network packet distribution-based approaches for analyzing tunnelling and exfiltration attacks over DNS [21,34,43,49]. While some of these works focus on using DNS-specific attributes, others use traffic or malware-specific attributes.…”
Section: Introductionmentioning
confidence: 99%