2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) 2014
DOI: 10.1109/camad.2014.7033254
|View full text |Cite
|
Sign up to set email alerts
|

Stream-wise detection of surreptitious traffic over DNS

Abstract: The Domain Name System (DNS) belongs to crucial services in a computer network. Because of its importance, DNS is usually allowed in security policies. That opens a way to break policies and to transfer data from/to restricted area due to misusage of a DNS infrastructure. This paper is focused on a detection of communication tunnels and other anomalies in a DNS traffic. The proposed detection module is designed to process huge volume of data and to detect anomalies at near real-time. It is based on combination… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…The idea is to apply the algorithm over streaming data, that is, during server operation . A new analysis for anomaly detection is thus triggered over a new block of features once a new feature is available.…”
Section: Cascading Clustering With Llmmentioning
confidence: 99%
“…The idea is to apply the algorithm over streaming data, that is, during server operation . A new analysis for anomaly detection is thus triggered over a new block of features once a new feature is available.…”
Section: Cascading Clustering With Llmmentioning
confidence: 99%
“…The last DNS tunneling detection technique presented in this paper combines both traffic and payload inspection [30]. The purpose is to detect tunnels and other anomalies via statistical analysis in huge volume of DNS traffic near real-time.…”
Section: Hybrid Inspectionmentioning
confidence: 99%
“…From the table, it can clearly be seen that some techniques cover more than one group. Especially, the hybrid detection technique [30] covers both traffic and payload inspection and both statistical and signature-based analysis. All the surveyed machine learning -based detection techniques can also be grouped into statistical analysis.…”
Section: Hybrid Inspectionmentioning
confidence: 99%
See 1 more Smart Citation
“…The original traffic cannot be directly inspected as it becomes a part of the domain name of the DNS packets. There have been several schemes for discovering DNS tunnels [8–12]. Nevertheless, more detailed information about DNS tunneling is still unavailable to the network inspectors.…”
Section: Introductionmentioning
confidence: 99%