An FPGA-Based Malicious DNS Packet Detection Tool

被引:0
|
作者
Thomas, Brennon [1 ]
Mullins, Barry [1 ]
机构
[1] USAF, Inst Technol, Wright Patterson AFB, OH 45433 USA
关键词
DNS; FPGA; Virtex; exfiltration; botnet; tunnel;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Billions and billions of packets traverse government and military networks every day. Often, these packets have legitimate destinations such as buying a book at amazon. com or downloading open source code using a File Transfer Protocol program. Unfortunately, the past few years have seen a massive increase in malicious, illegal, and suspicious traffic. One example is abusing the Domain Name System (DNS) protocol to exfiltrate sensitive data, establish backdoor tunnels, or control botnets. To counter this abuse and provide better incident detection, a physical hardware system is under development to detect these suspicious DNS packets. The system is constructed on a Xilinx Virtex-II Pro Field Programmable Gate Array (FPGA) and is based on a system originally developed to detect BitTorrent and Voice over Internet Protocol packets of interest. The first iteration prototype is limited in both processing speed (300 MHz) and by a 100 Mbps Ethernet interface. Despite the hardware shortfalls, preliminary experiments are promising for the system. The system inspects each packet, determines if it is a DNS packet, compares the first four characters of the lowest level domain against a DNS whitelist, and if the domain is not allowed, logs it for further analysis. The first experiment resulted in 100% malicious packet detection under an 88 Mbps network utilization. In the experiment, 50 malicious DNS packets were sent at one second intervals while the network was flooded with NetBIOS traffic. The second experiment resulted in an average of 91% malicious packet detection under an 88.7 Mbps network utilization. In the experiment, 2000 malicious DNS packets were sent as fast as possible while the network was flooded with non-malicious DNS traffic. For both experiments, DNS whitelist sizes of 1K, 10K, and 100K were used. Future work will focus on transferring the system to the Virtex-5 FPGA which contains a 550 MHz processor and a 1 Gbps Ethernet interface. In addition, the DNS whitelist size will be increased until the system fails to detect 50% of packets of interest. The goal is to determine if the system can be scaled to gigabit network speeds while also handling larger DNS whitelist sizes. The system seeks to aid network defenders in identifying and tracking malicious DNS packets traversing government networks while also providing better incident response awareness.
引用
收藏
页码:337 / 342
页数:6
相关论文
共 50 条
  • [31] Timing Fault Detection in FPGA-based Circuits
    Stott, Edward
    Levine, Joshua M.
    Cheung, Peter Y. K.
    Kapre, Nachiket
    [J]. 2014 IEEE 22ND ANNUAL INTERNATIONAL SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES (FCCM 2014), 2014, : 96 - 99
  • [32] FPGA-based Edge Inferencing for Fall Detection
    Bharathkumar, Kishore
    Paolini, Christopher
    Sarkar, Mahasweta
    [J]. 2020 IEEE GLOBAL HUMANITARIAN TECHNOLOGY CONFERENCE (GHTC), 2020,
  • [33] An FPGA-based network intrusion detection architecture
    Das, Abhishek
    Nguven, David
    Zambreno, Joseph
    Memik, Gokhan
    Choudhary, Alok
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (01) : 118 - 132
  • [34] Detection of Malicious Payload Distribution Channels in DNS
    Kara, A. Mert
    Binsalleeh, Hamad
    Mannan, Mohammad
    Youssef, Amr
    Debbabi, Mourad
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 853 - 858
  • [35] An FPGA-Based High-Performance Stateful Packet Processing Method
    Lu, Rui
    Guo, Zhichuan
    [J]. MICROMACHINES, 2023, 14 (11)
  • [36] Partial Reconfiguration And Specialized Circuitry for Flexible FPGA-based Packet Processing
    Hager, Sven
    Bendyk, Daniel
    Scheuermann, Bjoern
    [J]. 2015 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS (RECONFIG), 2015,
  • [37] Malicious DNS Tunneling Detection in Real-Traffic DNS Data
    Lambion, Danielle
    Josten, Michael
    Olumofin, Femi
    De Cock, Martine
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 5736 - 5738
  • [38] DNS Traffic Analysis for Malicious Domains Detection
    Ghafir, Ibrahim
    Prenosil, Vaclav
    [J]. 2ND INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN) 2015, 2015, : 613 - 618
  • [39] The Detection of Malicious Modifications in the FPGA
    Kamran Zahid
    [J]. Journal of Electronic Testing, 2022, 38 : 247 - 260
  • [40] DNS Graph Mining For Malicious Domain Detection
    Hau Tran
    An Nguyen
    Phuong Vo
    Tu Vu
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 4680 - 4685