2018 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN) 2018
DOI: 10.1109/nfv-sdn.2018.8725640
|View full text |Cite
|
Sign up to set email alerts
|

DNSxD: Detecting Data Exfiltration Over DNS

Abstract: According to a 2017 SANS report, 1 in 20 organisations fall victim to data exfiltration. Data exfiltration, often the final stage of a cyber attack has damaging consequences for the victim organisation. The use of the Domain Name System (DNS) protocol for data exfiltration was first discussed in 1998. Twenty years on, this covert transmission method has become more sophisticated as malicious actors adapt to evade detection techniques. The popularity of DNS for data exfiltration is due to the essential nature o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(15 citation statements)
references
References 6 publications
(5 reference statements)
0
15
0
Order By: Relevance
“…This is because our goal was to prevent information leakage by detecting DNS clients infected with malware in targeted attacks. As discussed in Section II-C, some researchers have focused on domain names and proposed filters whose design guideline was to identify the domain names used to perform DNS tunneling [11], [14], [18], [20], [21]. The shortcoming of such methods is that they fail when the attackers and their malware change tactics and utilize several domain names for the attacks.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…This is because our goal was to prevent information leakage by detecting DNS clients infected with malware in targeted attacks. As discussed in Section II-C, some researchers have focused on domain names and proposed filters whose design guideline was to identify the domain names used to perform DNS tunneling [11], [14], [18], [20], [21]. The shortcoming of such methods is that they fail when the attackers and their malware change tactics and utilize several domain names for the attacks.…”
Section: Discussionmentioning
confidence: 99%
“…DET [38] [20], [23], [24] DNScat [39] or DNScat2 [26] [12], [17], [18], [20], [22], [24] DNSExfiltrator [40] [20], [24] DNSMessenger [41] [23] DNSpionage [42] [23] dns2tcp [33] [9], [15], [16], [21], [22], [24] FrameworkPOS [43] [21], [23] iodine [32]…”
Section: B Conventional Attack Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The payload analysis is an evaluation of a DNS query and/or the corresponding DNS response, while the traffic analysis is an evaluation of DNS traffic over a monitoring period (e.g., in terms of time, number of samples, etc.). The features of interest in payload analysis are, for example, unigram or bigram character frequencies of domains or subdomains [4], [5], FQDN length [11], [15], entropy [11], [13], [15], the first 512 bytes of a DNS response [12], and the number of labels [15]. Regarding traffic analysis, the usual features of interest are, for example, the number of flows [6], Jensen-Shannon divergence computed from DNS query payloads [7], access counts of resource records [8], average time interval between a query and its response [9], a combination of Principal Component Analysis (PCA) and mutual information [10], the number of queries per domain [13], and average query length per domain [14].…”
Section: B Related Workmentioning
confidence: 99%
“…The features of interest in payload analysis are, for example, unigram or bigram character frequencies of domains or subdomains [4], [5], FQDN length [11], [15], entropy [11], [13], [15], the first 512 bytes of a DNS response [12], and the number of labels [15]. Regarding traffic analysis, the usual features of interest are, for example, the number of flows [6], Jensen-Shannon divergence computed from DNS query payloads [7], access counts of resource records [8], average time interval between a query and its response [9], a combination of Principal Component Analysis (PCA) and mutual information [10], the number of queries per domain [13], and average query length per domain [14]. These features are fed to machine learning models or used as thresholds to build countermeasures for DNS tunneling detection.…”
Section: B Related Workmentioning
confidence: 99%