2014 IEEE International Conference on Communications (ICC) 2014
DOI: 10.1109/icc.2014.6883426
|View full text |Cite
|
Sign up to set email alerts
|

Detection of malicious payload distribution channels in DNS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 40 publications
(24 citation statements)
references
References 9 publications
0
24
0
Order By: Relevance
“…This type of abuse of the DNS protocol for the sake of data exchange has been thoroughly studied in previous research along with its unique attributes [16], [18], [36]. The most commonly investigated unique attributes are: long queries and responses [36], different resource record distribution [18], and a high volume of requests and encoded data rather than plain text [16]. While these abnormalities may capture the entire landscape of data exchange over the DNS, they are insufficient for accurate data leakage detection, since not all data exchange is malicious.…”
Section: B Data Exchange Over the Dns Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…This type of abuse of the DNS protocol for the sake of data exchange has been thoroughly studied in previous research along with its unique attributes [16], [18], [36]. The most commonly investigated unique attributes are: long queries and responses [36], different resource record distribution [18], and a high volume of requests and encoded data rather than plain text [16]. While these abnormalities may capture the entire landscape of data exchange over the DNS, they are insufficient for accurate data leakage detection, since not all data exchange is malicious.…”
Section: B Data Exchange Over the Dns Protocolmentioning
confidence: 99%
“…Initial research in the field focused on specific DNS tunneling tools, mainly Iodine. Kara et al [18] analyze the difference in the distribution of TXT resource records requests between popular domains and domains used for tunneling with Iodine. Later versions of Iodine leverage other types of rich resource records (e.g., SRV, NULL).…”
Section: Related Workmentioning
confidence: 99%
“…The use of DNS as a malicious payload distribution channel, e.g. for tunneling, was explored in [28,29]. In the first paper [28], the malicious payload distribution channels are characterized based on the exchange behavior of the DNS request and response messages.…”
Section: Payload Inspectionmentioning
confidence: 99%
“…In the second paper [29], a DNS zone analysis -based approach is introduced. A near real-time detection is achieved by monitoring DNS requests and responses in passive DNS traffic.…”
Section: Payload Inspectionmentioning
confidence: 99%
“…To detect DNS-based botnet communications, there are some existing research works in the literature [5][6][7][8]. In these research works, they mainly analyzed the DNS traffic obtained from DNS resolvers and statistically considered the possibility of DNS basis botnet communications.…”
Section: Introductionmentioning
confidence: 99%