2023
DOI: 10.1109/access.2023.3250106
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Network Scanning Through Monitoring and Manipulation of DNS Traffic

Abstract: In this paper, we propose an approach for detecting internal and external network scanning attacks on enterprise networks. In our approach, an inline scan detection system (SDS) monitors the ingress and egress flows of an enterprise network subnet and detects scanning probes based on the correlation of flows with preceding DNS query/responses and reducing TTL values of DNS Resource Records (RR). Through rigorous evaluation, we show that our method is effective against both external and internal port scanners a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(1 citation statement)
references
References 23 publications
0
0
0
Order By: Relevance
“…Findings discussion 5 [16] Logistic regression to detect PortScan attacks and tested data balancing methods to achieve better results. 6 [17] Suggest a method for identifying internal and external network scanning attacks on business networks. An inline SDS is used in the method to monitor the ingress and egress flows of a corporate network subnet and identify scanning probes by correlating the flows with previous domain name system (DNS) queries, replies, and shortening DNS resource records' TTL values (RR).…”
Section: Appendix Table 1 Related Workmentioning
confidence: 99%
“…Findings discussion 5 [16] Logistic regression to detect PortScan attacks and tested data balancing methods to achieve better results. 6 [17] Suggest a method for identifying internal and external network scanning attacks on business networks. An inline SDS is used in the method to monitor the ingress and egress flows of a corporate network subnet and identify scanning probes by correlating the flows with previous domain name system (DNS) queries, replies, and shortening DNS resource records' TTL values (RR).…”
Section: Appendix Table 1 Related Workmentioning
confidence: 99%