2013
DOI: 10.1016/j.procs.2013.05.109
|View full text |Cite
|
Sign up to set email alerts
|

A Bigram based Real Time DNS Tunnel Detection Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 53 publications
(32 citation statements)
references
References 4 publications
0
32
0
Order By: Relevance
“…The inherent advantages and drawbacks of anomaly-based detection have been summarized at the end of Section 2.1, and an example is reported in the performance evaluation. Other approaches are based on character frequency analysis of the domain names [26,28]. More specifically, the tool of [27] detects DNS tunneling by exploiting a neural network whose inputs include information about the used domain names.…”
Section: Related Literaturementioning
confidence: 99%
See 1 more Smart Citation
“…The inherent advantages and drawbacks of anomaly-based detection have been summarized at the end of Section 2.1, and an example is reported in the performance evaluation. Other approaches are based on character frequency analysis of the domain names [26,28]. More specifically, the tool of [27] detects DNS tunneling by exploiting a neural network whose inputs include information about the used domain names.…”
Section: Related Literaturementioning
confidence: 99%
“…More specifically, the tool of [27] detects DNS tunneling by exploiting a neural network whose inputs include information about the used domain names. Other approaches are based on character frequency analysis of the domain names [26,28].…”
Section: Related Literaturementioning
confidence: 99%
“…The domain names used by Pisloader are not random-like, which is why Pisloader would stay undetected. Same goes for the detection technique presented in [26], although they better their detection possibilities by dividing data into training and classification parts, and by providing good performance metrics results. A DNS tunneling detection technique that would possibly detect the Pisloader malware is introduced in [28,29].…”
Section: Theoretical Comparison Of Dns Tunneling Detection Techniquesmentioning
confidence: 97%
“…Character frequency analysis was used for detecting DNS tunnels in [26] too. The key idea of their approach is the score mechanism, which is able to separate normal and tunnel domain names based on bigram character frequency in real-time.…”
Section: Payload Inspectionmentioning
confidence: 99%
“…Detection of DNS Tunnels: There are some proposed methods for detecting DNS tunneling within a network by using the n-gram analysis [6], [17]. They presented promising results in terms of detecting the tunnels.…”
Section: Related Workmentioning
confidence: 99%