An FPGA-Based Malicious DNS Packet Detection Tool

被引:0
|
作者
Thomas, Brennon [1 ]
Mullins, Barry [1 ]
机构
[1] USAF, Inst Technol, Wright Patterson AFB, OH 45433 USA
来源
PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY | 2010年
关键词
DNS; FPGA; Virtex; exfiltration; botnet; tunnel;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Billions and billions of packets traverse government and military networks every day. Often, these packets have legitimate destinations such as buying a book at amazon. com or downloading open source code using a File Transfer Protocol program. Unfortunately, the past few years have seen a massive increase in malicious, illegal, and suspicious traffic. One example is abusing the Domain Name System (DNS) protocol to exfiltrate sensitive data, establish backdoor tunnels, or control botnets. To counter this abuse and provide better incident detection, a physical hardware system is under development to detect these suspicious DNS packets. The system is constructed on a Xilinx Virtex-II Pro Field Programmable Gate Array (FPGA) and is based on a system originally developed to detect BitTorrent and Voice over Internet Protocol packets of interest. The first iteration prototype is limited in both processing speed (300 MHz) and by a 100 Mbps Ethernet interface. Despite the hardware shortfalls, preliminary experiments are promising for the system. The system inspects each packet, determines if it is a DNS packet, compares the first four characters of the lowest level domain against a DNS whitelist, and if the domain is not allowed, logs it for further analysis. The first experiment resulted in 100% malicious packet detection under an 88 Mbps network utilization. In the experiment, 50 malicious DNS packets were sent at one second intervals while the network was flooded with NetBIOS traffic. The second experiment resulted in an average of 91% malicious packet detection under an 88.7 Mbps network utilization. In the experiment, 2000 malicious DNS packets were sent as fast as possible while the network was flooded with non-malicious DNS traffic. For both experiments, DNS whitelist sizes of 1K, 10K, and 100K were used. Future work will focus on transferring the system to the Virtex-5 FPGA which contains a 550 MHz processor and a 1 Gbps Ethernet interface. In addition, the DNS whitelist size will be increased until the system fails to detect 50% of packets of interest. The goal is to determine if the system can be scaled to gigabit network speeds while also handling larger DNS whitelist sizes. The system seeks to aid network defenders in identifying and tracking malicious DNS packets traversing government networks while also providing better incident response awareness.
引用
收藏
页码:337 / 342
页数:6
相关论文
共 50 条
  • [41] FPGA-based fast eye detection method for edge device
    Byun, Jin Young
    Jeon, Jae Wook
    2022 22ND INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS (ICCAS 2022), 2022, : 1128 - 1130
  • [42] Design of FPGA-based TDLAS aircraft fire detection system
    Hao, Kui-hong
    Wang, Ji-xuan
    THIRD INTERNATIONAL CONFERENCE ON SENSORS AND INFORMATION TECHNOLOGY, ICSI 2023, 2023, 12699
  • [43] FPGA-based approach for change detection in GTAW welding process
    Carlos H. Llanos
    Ronald H. Hurtado
    Sadek C. Absi Alfaro
    Journal of the Brazilian Society of Mechanical Sciences and Engineering, 2016, 38 : 913 - 929
  • [44] A DNS Security Policy for Timely Detection of Malicious Modification on Webpages
    Gaurav, Varshney
    Nama, Shah
    2021 28TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2021, : 76 - 80
  • [45] The Design of FPGA-Based Real Time Intrusion Detection NIC
    Cheng, Bingyuan
    Qiu, Kaijin
    Yang, Zuyong
    INFORMATION TECHNOLOGY FOR MANUFACTURING SYSTEMS II, PTS 1-3, 2011, 58-60 : 2585 - 2591
  • [46] FPGA-Based Linear Detection Algorithm of an Underground Inspection Robot
    Zhang, Chuanwei
    Chen, Shirui
    Zhao, Lu
    Li, Xianghe
    Ma, Xiaowen
    ALGORITHMS, 2021, 14 (10)
  • [47] FPGA-Based Road Crack Detection Using Deep Learning
    Canese, Lorenzo
    Cardarilli, Gian Carlo
    Di Nunzio, Luca
    Fazzolari, Rocco
    Re, Marco
    Spano, Sergio
    ADVANCES IN SYSTEM-INTEGRATED INTELLIGENCE, SYSINT 2022, 2023, 546 : 65 - 73
  • [48] FPGA-based approach for change detection in GTAW welding process
    Llanos, Carlos H.
    Hurtado, Ronald H.
    Absi Alfaro, Sadek C.
    JOURNAL OF THE BRAZILIAN SOCIETY OF MECHANICAL SCIENCES AND ENGINEERING, 2016, 38 (03) : 913 - 929
  • [49] Comparison of DNS Based Methods for Detecting Malicious Domains
    Paz, Eyal
    Gudes, Ehud
    CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING (CSCML 2020), 2020, 12161 : 219 - 236
  • [50] Cyber Security Assurance Approaches for FPGA-Based Safety Platform Configuration Tool
    Kharchenko, Vyacheslav
    Kovalenko, Andriy
    Babeshko, Eugene
    Leontiiev, Kostyantyn
    2017 INTERNATIONAL CONFERENCE ON INFORMATION AND DIGITAL TECHNOLOGIES (IDT), 2017, : 160 - 163