"Off-Label" Use of DNS

被引:1
作者
Wala, Fatema Bannat [1 ,2 ]
Cotton, Chase [1 ]
机构
[1] Univ Delaware, 312 DuPont Hall, Newark, DE 19716 USA
[2] Lawrence Berkeley Natl Lab, 1 Cyclotron Rd 059-3068T, Berkeley, CA 94720 USA
来源
DIGITAL THREATS: RESEARCH AND PRACTICE | 2022年 / 3卷 / 03期
关键词
DNS; off-label; security; antivirus;
D O I
10.1145/3491261
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Domain Name System (DNS) is known to be one of the most widely abused protocols by threat actors to use in unconventional ways to hide under normal traffic. Apart from threat actors, DNS is being actively used or rather misused by many other service providers, vendors, and so on, to provide the intended services. An in-depth examination of the DNS logs collected over a long period revealed some very interesting legitimate use cases of the DNS protocol by the industry and other players, apart from its normal name resolution service function. We coin the term "Off-label use of DNS" to represent those use cases. Legitimate here simply means using DNS for non-malicious purposes other than what it was traditionally designed for, which is for providing domain resolution; a dictionary service mapping domain names to corresponding IP addresses. One of the main reasons DNS is used, or possibly misused, for these off-label use cases is the speed of data transfer and reduced overhead in terms of bandwidth. These off-label use cases of DNS can often leak important information about the clients and software they are running and can be leveraged in a variety of ways by the network security defenders/analysts to improve their detection on the network. This research will detail some of those legitimate off-label use cases and how they can be leveraged by the analysts to detect malware trends in the network and much more just by analyzing an enterprise's DNS logs.
引用
收藏
页数:13
相关论文
共 26 条
  • [1] Malware Detection using DNS Records and Domain Name Features
    Al Messabi, Khulood
    Aldwairi, Monther
    Al Yousif, Ayesha
    Thoban, Anoud
    Belqasmi, Fatna
    [J]. ICFNDS'18: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS, 2018,
  • [2] DNS Tunneling Detection Method Based on Multilabel Support Vector Machine
    Almusawi, Ahmed
    Amintoosi, Haleh
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [3] [Anonymous], 2012, P 2012 ACM C CONEXT
  • [4] [Anonymous], 2020, US
  • [5] [Anonymous], 2020, Run Docker Containers on Embedded Devices
  • [6] [Anonymous], 2019, Wawa Data Security Incident
  • [7] BannatWala Fatema, 2018, International Journal of Network Security & Its Applications (IJNSA), V10
  • [8] BannatWala Fatema, 2019, Antivirus-Detection
  • [9] Bromberger Seth, 2011, Dns as a covert channel within protected networks
  • [10] Unsupervised Learning Techniques for Malware Characterization: Understanding Certain DNS-based DDoS Attacks
    Burton, Renee
    [J]. DIGITAL THREATS: RESEARCH AND PRACTICE, 2020, 1 (03):