DNS Tunnelling, Exfiltration and Detection over Cloud Environments

被引:4
|
作者
Salat, Lehel [1 ]
Davis, Mastaneh [1 ]
Khan, Nabeel [2 ]
机构
[1] Kingston Univ, Fac Engn Comp & Environm, Penrhyn Rd, Kingston Upon Thames KT1 2EE, England
[2] Univ Chester, Dept Comp Sci, Chester CH1 4BJ, England
关键词
DNS tunnelling; DNS exfiltration; the elastic stack; DNS monitoring; cloud computing; AWS; GCP; Iodine; DNScat2;
D O I
10.3390/s23052760
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The domain name system (DNS) protocol is fundamental to the operation of the internet, however, in recent years various methodologies have been developed that enable DNS attacks on organisations. In the last few years, the increased use of cloud services by organisations has created further security challenges as cyber criminals use numerous methodologies to exploit cloud services, configurations and the DNS protocol. In this paper, two different DNS tunnelling methods, Iodine and DNScat, have been conducted in the cloud environment (Google and AWS) and positive results of exfiltration have been achieved under different firewall configurations. Detection of malicious use of DNS protocol can be a challenge for organisations with limited cybersecurity support and expertise. In this study, various DNS tunnelling detection techniques were utilised in a cloud environment to create an effective monitoring system with a reliable detection rate, low implementation cost, and ease of use for organisations with limited detection capabilities. The Elastic stack (an open-source framework) was used to configure a DNS monitoring system and to analyse the collected DNS logs. Furthermore, payload and traffic analysis techniques were implemented to identify different tunnelling methods. This cloud-based monitoring system offers various detection techniques that can be used for monitoring DNS activities of any network especially accessible to small organisations. Moreover, the Elastic stack is open-source and it has no limitation with regards to the data that can be uploaded daily.
引用
收藏
页数:18
相关论文
共 50 条
  • [31] Similarity Search over DNS Query Streams for Email Worm Detection
    Chatzis, Nikolaos
    Brownlee, Nevil
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 588 - +
  • [32] Exploring Simple Detection Techniques for DNS-over-HTTPS Tunnels
    Kwan, Carmen
    Janiszewski, Paul
    Qiu, Shela
    Wang, Cathy
    Bocovich, Cecylia
    PROCEEDINGS OF THE 2021 WORKSHOP ON FREE AND OPEN COMMUNICATIONS ON THE INTERNET (FOCI '21), 2021, : 37 - 42
  • [33] An ensemble framework for detection of DNS-Over-HTTPS (DOH) traffic
    Akarsh Aggarwal
    Manoj Kumar
    Multimedia Tools and Applications, 2024, 83 : 32945 - 32972
  • [34] Data Exfiltration Detection on Network Metadata with Autoencoders
    Willems, Daan
    Kohls, Katharina
    van der Kamp, Bob
    Vranken, Harald
    ELECTRONICS, 2023, 12 (12)
  • [35] A Hybrid Intrusion Detection System for Cloud Computing Environments
    Jelidi, Mohamed
    Ghourabi, Abdallah
    Gasmi, Karim
    2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 390 - 395
  • [36] Infrastructure Fault Detection and Prediction in Edge Cloud Environments
    Soualhia, Mbarka
    Fu, Chunyan
    Khomh, Foutse
    SEC'19: PROCEEDINGS OF THE 4TH ACM/IEEE SYMPOSIUM ON EDGE COMPUTING, 2019, : 222 - 235
  • [37] DNS tunnels detection via DNS-images
    D'Angelo, Gianni
    Castiglione, Arcangelo
    Palmieri, Francesco
    INFORMATION PROCESSING & MANAGEMENT, 2022, 59 (03)
  • [38] Intrusion detection in voice over IP environments
    Wu, Yu-Sung
    Apte, Vinita
    Bagchi, Saurabh
    Garg, Sachin
    Singh, Navjot
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 8 (03) : 153 - 172
  • [39] Intrusion detection in voice over IP environments
    Yu-Sung Wu
    Vinita Apte
    Saurabh Bagchi
    Sachin Garg
    Navjot Singh
    International Journal of Information Security, 2009, 8 : 153 - 172
  • [40] The fight over encrypted DNS
    Rashid, Fahmida Y.
    IEEE SPECTRUM, 2020, 57 (01) : 11 - 12