2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS) 2021
DOI: 10.1109/iciccs51141.2021.9432279
|View full text |Cite
|
Sign up to set email alerts
|

DNS Tunneling Detection using Machine Learning and Cache Miss Properties

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…Accuracies have been reached to clarify that entropy is based on the hostname is a useful feature for DNS tunneling detection. This outcome can be seen depending on the obtained results from Chowdhary et al (2021).…”
Section: Related Workmentioning
confidence: 88%
See 1 more Smart Citation
“…Accuracies have been reached to clarify that entropy is based on the hostname is a useful feature for DNS tunneling detection. This outcome can be seen depending on the obtained results from Chowdhary et al (2021).…”
Section: Related Workmentioning
confidence: 88%
“…This is done while the prototype is being implemented, training data is being prepared and the model is being created (Jin et al, 2019). Chowdhary et al (2021) proposed two distinct approaches for spotting the DNS Tunneling query. Later, these methods are merged to develop a DNS tunneling attack detector, which has the capability of informing the user about a possible attack taking place in real-time.…”
Section: Related Workmentioning
confidence: 99%
“…The experiments used eight DNS tunnel tools, including iodine, dnscat2, dns2tcp, DNShell, OzymanDNS, Cobalt Strike, DNSExfiltrator, and DET. A. Chowdhary et al [20] combined two methods for detecting DNS tunneling queries generated by tunnel tools, such as dns2tcp, iodine, tuns, and DNScapy. One method utilizes cache misses in DNS full-service resolvers, and the other uses machine learning technology to classify DNS queries.…”
Section: A Malicious Dns Tunnel Detectionmentioning
confidence: 99%
“…Chowdhary, Bhowmik, and Rudra, in [34], built a DNS tunneling attack detector. The authors of this paper combined two methods to build a detector.…”
Section: Related Workmentioning
confidence: 99%