Detecting Network Security Threats Using Domain Name System and NetFlow Traffic

被引:3
|
作者
Hananto, Rinkel [1 ]
Lim, Charles [1 ]
Ipung, Heru Purnomo [1 ]
机构
[1] Swiss German Univ, Fac Engn & Informat Technol, Kota Tangerang 15143, Banten, Indonesia
关键词
Botnet; DNS; DDoS; Information Entropy; NetFlow; Network Anomaly Detection; Network Security Threats; Traffic Correlation;
D O I
10.1145/3199478.3199505
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With more and more organization in the world rely on the Internet to do their business or activity, the malicious attackers are always looking for ways to penetrate in organization internal network to achieve their malicious goals. The malicious activities may include spam distribution, denial of service, adware, identity theft and many other security threats. Many of the security perimeter devices only able to detect network security threats from external, organization is left with many undetected or even unknown internal security threats. Many of these network security threats can be detected by monitoring and analyzing network traffic. One of the emerging threats is Domain Name System (DNS) Distributed Denial of Service (DDoS) attack, which flood the authoritative DNS server with large amount of DNS request. We introduce a new method to detect DDoS attack by using Netflow traffic as the early indicator of DDOS attacks and DNS traffic to validate the DNS DDOS attack. We also showed that by measuring statistical entropy of Netflow traffic and statistical values of DNS NXDOMAIN response, our proposed model could be used to detect either low volume or high volume DDoS attack.
引用
收藏
页码:105 / 109
页数:5
相关论文
共 50 条
  • [31] Modelling And Simulation For Detecting Vulnerabilities And Security Threats Of Smart Contracts Using Machine Learning
    Mughaid, Ala
    Obeidat, Ibrahim
    Shdaifat, Andaleeb
    Alhayjna, Razan
    AlZu'bi, Shadi
    2023 EIGHTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING, FMEC, 2023, : 123 - 127
  • [32] Real-time Analysis of NetFlow Data for Generating Network Traffic Statistics using Apache Spark
    Cermak, Milan
    Jirsik, Tomas
    Lastovicka, Martin
    NOMS 2016 - 2016 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2016, : 1019 - 1020
  • [33] Authoritative server's impact on Domain Name System's performance and security
    Wang, Yao
    Hu, Ming-Zeng
    Li, Bin
    Yan, Bo-Ru
    COMPUTATIONAL INTELLIGENCE, PT 2, PROCEEDINGS, 2006, 4114 : 536 - 544
  • [34] Maintenance, mishaps and mending in deployments of the domain name system security extensions (DNSSEC)
    Deccio, Casey
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2012, 5 (02) : 98 - 103
  • [35] Detecting Anomalies in Network Traffic Using the Method of Remaining Elements
    Velarde-Alvarado, P.
    Vargas-Rosales, C.
    Torres-Roman, D.
    Martinez-Heffera, A.
    IEEE COMMUNICATIONS LETTERS, 2009, 13 (06) : 462 - 462
  • [36] Application of XGBoost to the cyber-security problem of detecting suspicious network traffic events
    Podlodowski, Lukasz
    Kozlowski, Marek
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 5902 - 5907
  • [37] Dynamically Detecting Security Threats and Updating a Signature Based Intrusion Detection System's Database
    AlYousef, Mutep Y.
    Abdelmajeed, Nabih T.
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KES 2019), 2019, 159 : 1507 - 1516
  • [38] Using Wavelets for Compression and Detecting Events in Anomalous Network Traffic
    Kyriakopoulos, Konstantinos G.
    Parish, David J.
    2009 4TH INTERNATIONAL CONFERENCE ON SYSTEMS AND NETWORKS COMMUNICATIONS (ICSNC 2009), 2009, : 195 - 200
  • [39] Detecting Domain-Flux Malware Using DNS Failure Traffic
    Zou, Futai
    Li, Linsen
    Wu, Yue
    Li, Jianhua
    Zhang, Siyu
    Jiang, Kaida
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2018, 28 (02) : 151 - 173
  • [40] Detecting DDoS Threats Using Supervised Machine Learning for Traffic Classification in Software Defined Networking
    Hirsi, Abdinasir
    Audah, Lukman
    Salh, Adeb
    Alhartomi, Mohammed A.
    Ahmed, Salman
    IEEE Access, 2024, 12 : 166675 - 166702