DNS Tunnelling, Exfiltration and Detection over Cloud Environments

被引:4
|
作者
Salat, Lehel [1 ]
Davis, Mastaneh [1 ]
Khan, Nabeel [2 ]
机构
[1] Kingston Univ, Fac Engn Comp & Environm, Penrhyn Rd, Kingston Upon Thames KT1 2EE, England
[2] Univ Chester, Dept Comp Sci, Chester CH1 4BJ, England
关键词
DNS tunnelling; DNS exfiltration; the elastic stack; DNS monitoring; cloud computing; AWS; GCP; Iodine; DNScat2;
D O I
10.3390/s23052760
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The domain name system (DNS) protocol is fundamental to the operation of the internet, however, in recent years various methodologies have been developed that enable DNS attacks on organisations. In the last few years, the increased use of cloud services by organisations has created further security challenges as cyber criminals use numerous methodologies to exploit cloud services, configurations and the DNS protocol. In this paper, two different DNS tunnelling methods, Iodine and DNScat, have been conducted in the cloud environment (Google and AWS) and positive results of exfiltration have been achieved under different firewall configurations. Detection of malicious use of DNS protocol can be a challenge for organisations with limited cybersecurity support and expertise. In this study, various DNS tunnelling detection techniques were utilised in a cloud environment to create an effective monitoring system with a reliable detection rate, low implementation cost, and ease of use for organisations with limited detection capabilities. The Elastic stack (an open-source framework) was used to configure a DNS monitoring system and to analyse the collected DNS logs. Furthermore, payload and traffic analysis techniques were implemented to identify different tunnelling methods. This cloud-based monitoring system offers various detection techniques that can be used for monitoring DNS activities of any network especially accessible to small organisations. Moreover, the Elastic stack is open-source and it has no limitation with regards to the data that can be uploaded daily.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] Detection of Exfiltration and Tunneling over DNS
    Das, Anirban
    Shen, Min-Yi
    Shashanka, Madhu
    Wang, Jisheng
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2017, : 737 - 742
  • [2] Detection of malicious and low throughput data exfiltration over the DNS protocol
    Nadler, Asaf
    Aminov, Avi
    Shabtai, Asaf
    COMPUTERS & SECURITY, 2019, 80 : 36 - 53
  • [3] Detecting Data Exfiltration over Encrypted DNS
    Steadman, Jacob
    Scott-Hayward, Sandra
    PROCEEDINGS OF THE 2022 IEEE 8TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2022): NETWORK SOFTWARIZATION COMING OF AGE: NEW CHALLENGES AND OPPORTUNITIES, 2022, : 429 - 437
  • [4] DNSxD: Detecting Data Exfiltration Over DNS
    Steadman, Jacob
    Scott-Hayward, Sandra
    2018 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (NFV-SDN), 2018,
  • [5] Detecting DNS over HTTPS based data exfiltration
    Zhan, Mengqi
    Li, Yang
    Yu, Guangxi
    Li, Bo
    Wang, Weiping
    Computer Networks, 2022, 209
  • [6] Detecting DNS over HTTPS based data exfiltration
    Zhan, Mengqi
    Li, Yang
    Yu, Guangxi
    Li, Bo
    Wang, Weiping
    COMPUTER NETWORKS, 2022, 209
  • [7] Improving DNS Data Exfiltration Detection Through Temporal Analysis
    Spathoulas, Georgios
    Anagnostopoulos, Marios
    Papageorgiou, Konstantinos
    Kavallieratos, Georgios
    Theodoridis, Georgios
    UBIQUITOUS SECURITY, UBISEC 2023, 2024, 2034 : 133 - 146
  • [8] Real-Time Detection System for Data Exfiltration over DNS Tunneling Using Machine Learning
    Abualghanam, Orieb
    Alazzam, Hadeel
    Elshqeirat, Basima
    Qatawneh, Mohammad
    Almaiah, Mohammed Amin
    ELECTRONICS, 2023, 12 (06)
  • [9] DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour
    Ziza, Kristijan
    Tadic, Predrag
    Vuletic, Pavle
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (06) : 1865 - 1880
  • [10] DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour
    Kristijan Žiža
    Predrag Tadić
    Pavle Vuletić
    International Journal of Information Security, 2023, 22 : 1865 - 1880