Detecting Network Security Threats Using Domain Name System and NetFlow Traffic

被引:3
|
作者
Hananto, Rinkel [1 ]
Lim, Charles [1 ]
Ipung, Heru Purnomo [1 ]
机构
[1] Swiss German Univ, Fac Engn & Informat Technol, Kota Tangerang 15143, Banten, Indonesia
关键词
Botnet; DNS; DDoS; Information Entropy; NetFlow; Network Anomaly Detection; Network Security Threats; Traffic Correlation;
D O I
10.1145/3199478.3199505
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With more and more organization in the world rely on the Internet to do their business or activity, the malicious attackers are always looking for ways to penetrate in organization internal network to achieve their malicious goals. The malicious activities may include spam distribution, denial of service, adware, identity theft and many other security threats. Many of the security perimeter devices only able to detect network security threats from external, organization is left with many undetected or even unknown internal security threats. Many of these network security threats can be detected by monitoring and analyzing network traffic. One of the emerging threats is Domain Name System (DNS) Distributed Denial of Service (DDoS) attack, which flood the authoritative DNS server with large amount of DNS request. We introduce a new method to detect DDoS attack by using Netflow traffic as the early indicator of DDOS attacks and DNS traffic to validate the DNS DDOS attack. We also showed that by measuring statistical entropy of Netflow traffic and statistical values of DNS NXDOMAIN response, our proposed model could be used to detect either low volume or high volume DDoS attack.
引用
收藏
页码:105 / 109
页数:5
相关论文
共 50 条
  • [1] A Survey of Network Traffic Visualization in Detecting Network Security Threats
    Liu, Xiaomei
    Sun, Yong
    Fang, Liang
    Liu, Junpeng
    Yu, Lingjing
    TRUSTWORTHY COMPUTING AND SERVICES (ISCTCS 2014), 2015, 520 : 91 - 98
  • [2] Detecting security threats in the network core using Data Mining techniques
    Sandford, P. J.
    Parish, D. J.
    Sandford, J. M.
    2006 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, VOLS 1 AND 2, 2006, : 951 - 954
  • [3] Detecting Security Threats Using Mobile Devices
    Li, J. Jenny
    Abbate, Peter
    Vega, Brian
    2015 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY - COMPANION (QRS-C 2015), 2015, : 40 - 45
  • [4] Survey on domain name system security
    Research Center of Computer Network and Information Security Technology, Harbin Institute of Technology, Harbin 150001, China
    不详
    不详
    Tongxin Xuebao, 2007, 9 (91-103):
  • [5] Survey on Domain Name System Security
    Zou, Futai
    Zhang, Siyu
    Pang, Li
    Li, Linsen
    Li, Jianhua
    Pei, Bei
    2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC 2016), 2016, : 602 - 607
  • [6] A NetFlow Based Internet-worm Detecting System in Large Network
    Chan, Yi-Tung F.
    Shoniregun, Charles A.
    Akmayeva, Galyna A.
    2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 593 - +
  • [7] The Construction of Network Domain Name Security Access Identification System Based on Artificial Intelligence
    Li, Lin
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2023, 18 (01)
  • [8] Anomaly detection in NetFlow network traffic using supervised machine learning algorithms
    Fosic, Igor
    Zagar, Drago
    Grgic, Kresimir
    Krizanovic, Visnja
    JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2023, 33
  • [9] Detecting cyber security threats in weblogs using probabilistic models
    Tsai, Flora S.
    Chan, Kap Luk
    INTELLIGENCE AND SECURITY INFORMATICS, 2007, 4430 : 46 - +
  • [10] Network Traffic Classification Based On A Deep Learning Approach Using NetFlow Data
    Zhang Long
    Wang Jinsong
    COMPUTER JOURNAL, 2023, 66 (08): : 1882 - 1892