DNS tunneling detection using machine learning and cache miss properties
| dc.contributor.author | Chowdhary, A. | |
| dc.contributor.author | Bhowmik, M. | |
| dc.contributor.author | Rudra, B. | |
| dc.date.accessioned | 2026-02-06T06:35:56Z | |
| dc.date.issued | 2021 | |
| dc.description.abstract | In a DNS Tunneling attack, data or other useful information is embedded within a DNS query and exfiltrated. Such attacks are difficult to detect because DNS is a fundamental protocol and blocking legitimate domain names can lead to an unpleasant experience for the users. Thus, detecting whether the DNS query is exfiltrating data or not is a challenging task. Mimicking genuine queries by the attacker makes this even more difficult. This research work presents two different methods for detecting the DNS Tunneling query and later they are combined to build a DNS Tunneling Attack Detector that can inform the client about a potential attack going on in real time. The first method uses cache misses in a DNS cache server and the second method utilizes machine learning techniques to classify a given DNS query. Overall, with around 93% accuracy of certain Machine Learning classifiers on classifying on a per packet basis along with extra validation from the cache-miss approach, a detector has been developed to accurately report DNS tunneling traffic © 2021 IEEE. | |
| dc.identifier.citation | Proceedings - 5th International Conference on Intelligent Computing and Control Systems, ICICCS 2021, 2021, Vol., , p. 1225-1229 | |
| dc.identifier.uri | https://doi.org/10.1109/ICICCS51141.2021.9432279 | |
| dc.identifier.uri | https://idr.nitk.ac.in/handle/123456789/30144 | |
| dc.publisher | Institute of Electrical and Electronics Engineers Inc. | |
| dc.subject | Classification | |
| dc.subject | DNS tunneling | |
| dc.subject | Entropy | |
| dc.subject | FQDN | |
| dc.subject | Machine Learning | |
| dc.title | DNS tunneling detection using machine learning and cache miss properties |
