Behavior Analysis based DNS Tunneling Detection and Classification with Big Data Technologies

被引:13
作者
Yu, Bin [1 ]
Smith, Les [1 ]
Threefoot, Mark [1 ]
Olumofin, Femi [1 ]
机构
[1] Infoblox Inc, CTO Off, 3111 Coronado Dr, Santa Clara, CA 95054 USA
来源
IOTBD: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND BIG DATA | 2016年
关键词
Behaviour Analysis; Time Series; Big Data Analytics; DNS Security; Data Exfiltration; Anomaly Detection; Classification;
D O I
10.5220/0005795002840290
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Domain Name System (DNS) is ubiquitous in any network. DNS tunnelling is a technique to transfer data, convey messages or conduct TCP activities over DNS protocol that is typically not blocked or watched by security enforcement such as firewalls. As a technique, it can be utilized in many malicious ways which can compromise the security of a network by the activities of data exfiltration, cyber-espionage, and command and control. On the other side, it can also be used by legitimate users. The traditional methods may not be able to distinguish between legitimate and malicious uses even if they can detect the DNS tunnelling activities. We propose a behaviour analysis based method that can not only detect the DNS tunnelling, but also classify the activities in order to catch and block the malicious tunnelling traffic. The proposed method can achieve the scale of real-time detection on fast and large DNS data with the use of big data technologies
引用
收藏
页码:284 / 290
页数:7
相关论文
共 13 条
  • [1] Borders K., 2004, CCS 04 P 11 ACM C CO, P110
  • [2] Born K., 2010, P 9 ANN SEC C LAS VE
  • [3] Crotti M., 2008, P 43 IEEE INT C COMM, P19
  • [4] Detecting HTTP tunnels with statistical mechanisms
    Crotti, Manuel
    Dusi, Maurizio
    Gringoli, Francesco
    Salgarelli, Luca
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 6162 - 6168
  • [5] Dusi M., 2008, P 17 IEEE INT C COMP
  • [6] Ellens W, 2013, LECT NOTES COMPUT SC, V7943, P124, DOI 10.1007/978-3-642-38998-6_16
  • [7] Farnham G., 2013, Detecting dns tunneling
  • [8] Hind J, 2009, P DEFCON 17 LAS VEG
  • [9] ISC, ISC SEC INF EXCH
  • [10] A MATHEMATICAL THEORY OF COMMUNICATION
    SHANNON, CE
    [J]. BELL SYSTEM TECHNICAL JOURNAL, 1948, 27 (03): : 379 - 423