2020 23rd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN) 2020
DOI: 10.1109/icin48450.2020.9059472
|View full text |Cite
|
Sign up to set email alerts
|

Cache-Property-Aware Features for DNS Tunneling Detection

Abstract: A lot of enterprises are under threat of targeted attacks causing data exfiltration. As a means of performing the attacks, attackers and their malware have exploited DNS tunneling in recent years. Although there are many research efforts to detect DNS tunneling, the previously proposed methods rely on features that the malicious entities can easily obfuscate by mimicking legitimate ones. Therefore, this obfuscation would result in data leakage. In order to mitigate this issue, we focus on a trace of DNS tunnel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…DNS tunnelling can be employed for many purposes, such as carrying data for the packets of DNS [45]. The attacker exploits DNS tunnelling to exfiltrate data from the enterprises hacked into [56]. When the attacker bypasses the edge firewall of the enterprise, the tunnel can be used to execute a command or copy data through the domain name exploit in DNS queries and similar DNS replies [57].…”
Section: Protocol Abuse Attacksmentioning
confidence: 99%
“…DNS tunnelling can be employed for many purposes, such as carrying data for the packets of DNS [45]. The attacker exploits DNS tunnelling to exfiltrate data from the enterprises hacked into [56]. When the attacker bypasses the edge firewall of the enterprise, the tunnel can be used to execute a command or copy data through the domain name exploit in DNS queries and similar DNS replies [57].…”
Section: Protocol Abuse Attacksmentioning
confidence: 99%
“…To the best of our knowledge, our previous work [1] was the first to analyze cache-property-aware features, and this paper is an extended version. We extend the previous work with the following contributions:…”
Section: Introductionmentioning
confidence: 99%
“…Security threats take different forms, but one of these form is taking the advantage of domain name system (DNS) protocol for passing dangerous and malicious procedures, this attack attempt is known as DNS tunneling [1]. DNS is characterized by its simplicity where it intends to offer a straightforward way for accessing particular server through the domain name instead of the IP address [2][3][4][5]. Because of its simplicity, attackers attempt to use it for creating a tunnel to execute malicious scripts that intended to capture confidential information, gaining a super access, or attempting to harm the server [6].…”
Section: Introductionmentioning
confidence: 99%