Lorena de Souza Bezerra Borges, Robson de Oliveira Albuquerque, R. T. de Sousa Júnior
{"title":"A security model for DNS tunnel detection on cloud platform","authors":"Lorena de Souza Bezerra Borges, Robson de Oliveira Albuquerque, R. T. de Sousa Júnior","doi":"10.1109/WCNPS56355.2022.9969715","DOIUrl":null,"url":null,"abstract":"DNS tunneling uses DNS protocol features to establish command and control channels thus being possibly exploited as a malicious tool for data exfiltration. DNS tunneling security threats affect crossplatform systems within local and cloud computing resources. This article proposes an effective DNS tunnel detection methodology integrating cloud-based resources. The proposed detection methods compose an unsupervised machine-learning model execution for anomaly identification. The validation uses a collected DNS traffic dataset and shows the practical approach for C2, data exfiltration, and heartbeat tunnel test situations, as high levels of anomaly detection are obtained even for those lightweight data during the transfer process. This study has an operational approach and could be adapted to compose security control systems for organizations.","PeriodicalId":120276,"journal":{"name":"2022 Workshop on Communication Networks and Power Systems (WCNPS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Workshop on Communication Networks and Power Systems (WCNPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WCNPS56355.2022.9969715","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
DNS tunneling uses DNS protocol features to establish command and control channels thus being possibly exploited as a malicious tool for data exfiltration. DNS tunneling security threats affect crossplatform systems within local and cloud computing resources. This article proposes an effective DNS tunnel detection methodology integrating cloud-based resources. The proposed detection methods compose an unsupervised machine-learning model execution for anomaly identification. The validation uses a collected DNS traffic dataset and shows the practical approach for C2, data exfiltration, and heartbeat tunnel test situations, as high levels of anomaly detection are obtained even for those lightweight data during the transfer process. This study has an operational approach and could be adapted to compose security control systems for organizations.