DNS tunneling detection through statistical fingerprints of protocol messages and machine learning

被引:38
作者
Aiello, M. [1 ]
Mongelli, M. [1 ]
Papaleo, G. [1 ]
机构
[1] Natl Res Council Italy, Inst Elect Comp & Telecommun Engn, I-16149 Genoa, Italy
关键词
intrusion detection; DNS tunneling; supervised learning; ensemble techniques; INTRUSION DETECTION; IDENTIFICATION; CLASSIFICATION;
D O I
10.1002/dac.2836
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The use of covert-channel methods to bypass security policies has increased considerably in the recent years. Malicious users neutralize security restriction by encapsulating protocols like peer-to-peer, chat or http proxy into other allowed protocols like Domain Name Server (DNS) or HTTP. This paper illustrates a machine learning approach to detect one particular covert-channel technique: DNS tunneling. Despite packet inspection may guarantee reliable intrusion detection in this context, it may suffer of scalability performance when a large set of sockets should be monitored in real time. Detecting the presence of DNS intruders by an aggregation-based monitoring is of main interest as it avoids packet inspection, thus preserving privacy and scalability. The proposed monitoring mechanism looks at simple statistical properties of protocol messages, such as statistics of packets inter-arrival times and of packets sizes. The analysis is complicated by two drawbacks: silent intruders (generating small statistical variations of legitimate traffic) and quick statistical fingerprints generation (to obtain a detection tool really applicable in the field). Results from experiments conducted on a live network are obtained by replicating individual detections over successive samples over time and by making a global decision through a majority voting scheme. The technique overcomes traditional classifier limitations. An insightful analysis of the performance leads to discover a unique intrusion detection tool, applicable in the presence of different tunneled applications. Copyright (c) 2014 John Wiley & Sons, Ltd.
引用
收藏
页码:1987 / 2002
页数:16
相关论文
共 33 条
[1]   Can encrypted traffic be identified without port numbers, IP addresses and payload inspection? [J].
Alshammari, Riyad ;
Zincir-Heywood, A. Nur .
COMPUTER NETWORKS, 2011, 55 (06) :1326-1350
[2]  
[Anonymous], 2006, IEEE GLOBECOM 2006
[3]  
[Anonymous], 2013, P INT S COMP COMM, DOI DOI 10.1109/ISCC.2013.6755060
[4]   Detecting and classifying delay Data Exceptions on communication networks using rule based algorithms [J].
Benmusa, T ;
Parish, DJ ;
Sandford, M .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2005, 18 (02) :159-177
[5]  
Bohling G., CLASSICAL NORMAL BAS
[6]  
Born K., 2010, P 9 ANN SEC C LAS VE
[7]  
Brown G., ENSEMBLE LEARNING TU
[8]  
Burghouwt P., 2010, ICITST 2010 LOND UK, P1
[9]   Improving PCA-based anomaly detection by using multiple time scale analysis and Kullback-Leibler divergence [J].
Callegari, Christian ;
Gazzarrini, Loris ;
Giordano, Stefano ;
Pagano, Michele ;
Pepe, Teresa .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (10) :1731-1751
[10]  
Celik Z. Berkay, 2013, 2013 IEEE Symposium on Computers and Communications (ISCC), P000868, DOI 10.1109/ISCC.2013.6755058