2020 International Conference on Innovation and Intelligence for Informatics, Computing and Technologies (3ICT) 2020
DOI: 10.1109/3ict51146.2020.9312004
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Malicious DNS over HTTPS Traffic Using Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
20
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(21 citation statements)
references
References 11 publications
1
20
0
Order By: Relevance
“…over HTTPS client, server software available on https://github.com/m13253/dns-over-https have slightly different metrics, the DoH traffic characteristics are significantly different from the other HTTPS traffic. Thus, it is possible to develop accurate methods of DoH traffic identification as already presented in the literature [33,34,35] but also to identify the different software implementations of DoH servers and their deployments.…”
Section: Dnsmentioning
confidence: 99%
“…over HTTPS client, server software available on https://github.com/m13253/dns-over-https have slightly different metrics, the DoH traffic characteristics are significantly different from the other HTTPS traffic. Thus, it is possible to develop accurate methods of DoH traffic identification as already presented in the literature [33,34,35] but also to identify the different software implementations of DoH servers and their deployments.…”
Section: Dnsmentioning
confidence: 99%
“…The authors developed machine-learning models with a hybrid set of features from a rich and diversified dataset that achieved over 99% precision in malicious DoH traffic detection. Using the "CIRA-CIC-DoHBrw-2020" dataset, three follow-up research works [26,27,105] demonstrated the effectiveness of various machine learning algorithms such as Logistic Regression (LR), Random Forest (RF), K-Nearest Neighbors (KNN), XGBoost, Light gradient boosting machine (LGBM) using 34 traffic features originally identified in [84].…”
Section: Featuresmentioning
confidence: 99%
“…Following this, Singh et al applied several ML classifiers to detect attack activity in DoH and traditional DNS traffic [49]. They studied DoH security risks since DoH bypassed local security measures such as Firewalls and IDSs.…”
Section: Dns Traffic Analysismentioning
confidence: 99%
“…Taking all these factors into account, researchers have started to explore host-based and network-based monitoring for DoH protocol analysis [30]. To this end, some recent works have evaluated the use of Machine Learning (ML), entropy, and network packet distribution-based approaches for analyzing tunnelling and exfiltration attacks over DNS [21,34,43,49]. While some of these works focus on using DNS-specific attributes, others use traffic or malware-specific attributes.…”
Section: Introductionmentioning
confidence: 99%