Abstract | ||
---|---|---|
DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security breach can be misused for activities like free web browsing, but also for command & control traffic or cyber espionage, thus motivating the search for effective automated DNS tunnel detection techniques. In this paper we develop such a technique, based on the monitoring and analysis of network flows. Our methodology combines flow information with statistical methods for anomaly detection. The contribution of our paper is twofold. Firstly, based on flow-derived variables that we identified as indicative of DNS tunnelling activities, we identify and evaluate a set of non-parametrical statistical tests that are particularly useful in this context. Secondly, the efficacy of the resulting tests is demonstrated by extensive validation experiments in an operational environment, covering many different usage scenarios. |
Year | DOI | Venue |
---|---|---|
2013 | 10.1007/978-3-642-38998-6_16 | Lecture Notes in Computer Science |
Keywords | Field | DocType |
security breach,anomaly detection,non-parametrical statistical test,security policy,control traffic,detection technique,effective automated dns tunnel,dns tunnelling activity,flow-based detection,statistical method,dns tunnel,network flows,cyber security,informatics | Flow network,Anomaly detection,Computer science,Flow (psychology),Web navigation,Security policy,Statistical hypothesis testing,Distributed computing | Conference |
Volume | ISSN | Citations |
7943 | 0302-9743 | 13 |
PageRank | References | Authors |
0.79 | 9 | 6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Wendy Ellens | 1 | 43 | 4.21 |
Piotr Żuraniewski | 2 | 26 | 2.52 |
Anna Sperotto | 3 | 576 | 48.30 |
Harm Schotanus | 4 | 13 | 0.79 |
Michel Mandjes | 5 | 534 | 73.65 |
Erik Meeuwissen | 6 | 50 | 6.02 |