Detecting Network Security Threats Using Domain Name System and NetFlow Traffic

被引:3
|
作者
Hananto, Rinkel [1 ]
Lim, Charles [1 ]
Ipung, Heru Purnomo [1 ]
机构
[1] Swiss German Univ, Fac Engn & Informat Technol, Kota Tangerang 15143, Banten, Indonesia
关键词
Botnet; DNS; DDoS; Information Entropy; NetFlow; Network Anomaly Detection; Network Security Threats; Traffic Correlation;
D O I
10.1145/3199478.3199505
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With more and more organization in the world rely on the Internet to do their business or activity, the malicious attackers are always looking for ways to penetrate in organization internal network to achieve their malicious goals. The malicious activities may include spam distribution, denial of service, adware, identity theft and many other security threats. Many of the security perimeter devices only able to detect network security threats from external, organization is left with many undetected or even unknown internal security threats. Many of these network security threats can be detected by monitoring and analyzing network traffic. One of the emerging threats is Domain Name System (DNS) Distributed Denial of Service (DDoS) attack, which flood the authoritative DNS server with large amount of DNS request. We introduce a new method to detect DDoS attack by using Netflow traffic as the early indicator of DDOS attacks and DNS traffic to validate the DNS DDOS attack. We also showed that by measuring statistical entropy of Netflow traffic and statistical values of DNS NXDOMAIN response, our proposed model could be used to detect either low volume or high volume DDoS attack.
引用
收藏
页码:105 / 109
页数:5
相关论文
共 50 条
  • [41] Design of Malicious Domain Name Analysis System Based on Neural Network
    Zhang, Mengyu
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (03): : 2264 - 2267
  • [42] Hybrid Detection and Tracking of Fast-Flux Botnet on Domain Name System Traffic
    Zou Futai
    Zhang Siyu
    Rao Weixiong
    CHINA COMMUNICATIONS, 2013, 10 (11) : 81 - 94
  • [43] Detecting domain-flux botnet based on DNS traffic features in managed network
    Dinh-Tu Truong
    Cheng, Guang
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (14) : 2338 - 2347
  • [44] Domain name system security and privacy: A contemporary survey (vol 185, 107699, 2020)
    Khormali, Aminollah
    Park, Jeman
    Alasmary, Hisham
    Anwar, Afsah
    Saad, Muhammad
    Mohaisen, David
    COMPUTER NETWORKS, 2021, 188
  • [45] The politicization of the Internet's Domain Name System: Implications for Internet security, universality, and freedom
    Bradshaw, Samantha
    DeNardis, Laura
    NEW MEDIA & SOCIETY, 2018, 20 (01) : 332 - 350
  • [46] Cross-domain Network Traffic Classification Using Unsupervised Domain Adaptation
    Li, Dongpu
    Yuan, Qifeng
    Li, Tan
    Chen, Shuangwu
    Yang, Jian
    2020 34TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2020), 2020, : 245 - +
  • [47] Use of Machine Learning in Detecting Network Security of Edge Computing System
    Hou, Size
    Huang, Xin
    2019 4TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA ANALYTICS (ICBDA 2019), 2019, : 252 - 256
  • [48] Hybrid deeper neural network model for detection of the Domain Name System over Hypertext markup language protocol traffic flooding attacks
    Kasim, Omer
    SOFT COMPUTING, 2023, 27 (09) : 5923 - 5932
  • [49] Hybrid deeper neural network model for detection of the Domain Name System over Hypertext markup language protocol traffic flooding attacks
    Ömer Kasim
    Soft Computing, 2023, 27 : 5923 - 5932
  • [50] FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data using Network Flows
    Sacramento, Luis
    Medeiros, Iberia
    Bota, Joao
    Correial, Miguel
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 567 - 572