Detecting malicious DoH traffic: Leveraging small sample analysis and adversarial networks for detection

被引:0
|
作者
Wu, Shaoqian [1 ]
Wang, Wei [1 ]
Ding, Zhanmeng [1 ]
机构
[1] Beijing Topsec Network secur Technol Co LTD, Coordinate Lab, Beijing 100000, Peoples R China
关键词
DNS over HTTPS (DoH); Small sample; Limited data; Malicious detection; Generative adversarial networks; DNS;
D O I
10.1016/j.jisa.2024.103827
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In light of the escalating frequency of DNS attacks, it is imperative to bolster user security and privacy through the encryption of DNS queries. However, conventional methods for detecting DNS traffic are no longer effective in identifying encrypted traffic, particularly with the utilization of the DNS-over-HTTPS (DoH) protocol, which employs secure HTTPS for DNS resolution. To confront this challenge, we propose a novel model for detecting malicious DoH traffic, named DoH-TriCGAN, which distinguishes between non-DoH, benign DoH, and malicious DoH traffic. DoH-TriCGAN employs a conditional generative adversarial network comprising three network components, for which we only provide additional information to the generator. We extracted different small sample datasets and large sample dataset from the CIRA-CIC-DoHBrw-2020 dataset, to evaluate the efficiency and effectiveness of the proposed DoH-TriCGAN model, and compared the quality of the generated synthetic data. To establish a benchmark, we utilized the six metrics - accuracy, precision, recall, F1 -score, ROC_AUC, and PR_AUC - to assess the performance of our model. The results demonstrate our proposed model outperforms the other five models (RF, XGBoost, BiGRU, Autoencoder, Transformer), showing the best performance particularly in scenarios with limited training samples, while also demonstrating data expansion capabilities by generating high -quality synthetic data to address the issue of insufficient network traffic.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] Leveraging Crowdsourcing for Efficient Malicious Users Detection in Large-Scale Social Networks
    Yang, Guang
    He, Shibo
    Shi, Zhiguo
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (02): : 330 - 339
  • [32] Early Detection of Malicious Flux Networks via Large-Scale Passive DNS Traffic Analysis
    Perdisci, Roberto
    Corona, Igino
    Giacinto, Giorgio
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (05) : 714 - 726
  • [33] Analysis of NetFlow Features' Importance in Malicious Network Traffic Detection
    Campazas-Vega, Adrian
    Samuel Crespo-Martinez, Ignacio
    Manuel Guerrero-Higueras, Angel
    Alvarez-Aparicio, Claudia
    Matellan, Vicente
    [J]. 14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS AND 12TH INTERNATIONAL CONFERENCE ON EUROPEAN TRANSNATIONAL EDUCATIONAL (CISIS 2021 AND ICEUTE 2021), 2022, 1400 : 52 - 61
  • [34] EMTD-SSC: An Enhanced Malicious Traffic Detection Model Using Transfer Learning Under Small Sample Conditions in IoT
    Ge, Yueqin
    Gao, Yali
    Li, Xiaoyong
    Cai, Binsi
    Xi, Jinwen
    Yu, Shui
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (19): : 30725 - 30741
  • [35] Intrusion Detection System for Detecting Malicious Nodes in Mobile Ad Hoc Networks
    Singh, Yuvraj
    Jena, Sanjay Kumar
    [J]. ADVANCES IN PARALLEL, DISTRIBUTED COMPUTING, 2011, 203 : 410 - 419
  • [36] Perceptual Generative Adversarial Networks for Small Object Detection
    Li, Jianan
    Liang, Xiaodan
    Wei, Yunchao
    Xu, Tingfa
    Feng, Jiashi
    Yan, Shuicheng
    [J]. 30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017), 2017, : 1951 - 1959
  • [37] Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features
    Yun, Xiaochun
    Xie, Jiang
    Li, Shuhao
    Zhang, Yongzheng
    Sun, Peishuai
    [J]. Computers and Security, 2022, 121
  • [38] Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features
    Yun, Xiaochun
    Xie, Jiang
    Li, Shuhao
    Zhang, Yongzheng
    Sun, Peishuai
    [J]. COMPUTERS & SECURITY, 2022, 121
  • [39] Malicious Traffic Detection in IoT and Local Networks Using Stacked Ensemble Classifier
    Indrasiri, R. D. Pubudu L.
    Lee, Ernesto
    Rupapara, Vaibhav
    Rustam, Furqan
    Ashraf, Imran
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 71 (01): : 489 - 515
  • [40] Semi-supervised Malicious Traffic Detection with Improved Wasserstein Generative Adversarial Network with Gradient Penalty
    Wang, Jiafeng
    Liu, Ming
    Yin, Xiaokang
    Zhao, Yuhao
    Liu, Shengli
    [J]. 2022 IEEE 6TH ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2022, : 1916 - 1922