Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request

Can We Detect Malicious Behaviours in Encrypted DNS Tunnels Using Network Flow Entropy?

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • معلومة اضافية
    • بيانات النشر:
      River Publishers
    • الموضوع:
      2022
    • نبذة مختصرة :
      This paper explores the concept of entropy of a flow to augment flow statistical features for encrypted DNS tunnelling detection, specifically DNS over HTTPS traffic. To achieve this, the use of flow exporters, namely Argus, DoHlyzer and Tranalyzer2 are studied. Statistical flow features automatically generated by the aforementioned tools are then augmented with the flow entropy. In this work, flow entropy is calculated using three different techniques: (i) entropy over all packets of a flow, (ii) entropy over the first 96 bytes of a flow, and (iii) entropy over the first n-packets of a flow. These features are provided as input to ML classifiers to detect malicious behaviours over four publicly available datasets. This model is optimized using TPOT-AutoML system, where the Random Forest classifier provided the best performance achieving an average F-measure of 98% over all testing datasets employed.
    • الرقم المعرف:
      10.13052/jcsm2245-1439.1135
    • Rights:
      http://creativecommons.org/licenses/by-nc/4.0
    • الرقم المعرف:
      edsbas.F9061A7B