Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition

被引:0
|
作者
Sepideh Niktabe
Arash Habibi Lashkari
Dilli Prasad Sharma
机构
[1] York University,Computer Science, Department of EECS
[2] York University,Behavior
[3] University of Toronto,Centric Cybersecurity Center (BCCC), School of Information Technology
[4] BCCC,Department of Electrical and Computer Engineering
[5] DB2004 Victor Phillip Dahdaleh Building (formerly TEL),undefined
关键词
DNS; DNS over HTTPS (DoH); Pattern recognition; Statistical pattern recognition; Behavior profiling; Malicious behavior analysis;
D O I
暂无
中图分类号
学科分类号
摘要
The domain name system (DNS) protocol has been used for over three decades. It plays a vital role in the functioning of the Internet by facilitating the conversion of domain names into IP addresses. However, DNS is an early and vulnerable network protocol that attackers frequently target due to its numerous security flaws. To address these security concerns, several improvements have been introduced over time. The most recent enhancement is DNS over HTTPS (DoH), which aims to enhance user privacy and security by safeguarding DNS requests and responses from eavesdropping and data manipulation. Nevertheless, DoH encounters several security and privacy issues, such as encrypted traffic hindering network administrators from inspecting DNS packets for Malicious activity. Consequently, this raises concerns regarding potential security breaches and increased risk. Identification and characterizing Malicious behavior of DoH network traffic helps mitigate these threats. To tackle these issues, this research proposes two statistical pattern recognition models based on logistic and linear regression. These proposed models aim to identify the profile of Malicious DoH network traffic behavior by recognizing data patterns. In this order, we proposed two models consisting of two primary stages: data preprocessing, which involves data preparation and the selection of optimal feature sets, and pattern recognition, in which the most suitable pattern is selected and used for data classification. We also presented the obtained Malicious DoH profile utilizing the correlation coefficients between the features. To assess the effectiveness of the proposed approaches, the CIRA-CIC-DoHBrw-2020 dataset is utilized, and a comparison is made against state-of-the-art machine learning and deep learning models. Experimental results indicate that the logistic regression-based model outperformed linear regression-based. Moreover, while the outcomes indicated that the effectiveness of the linear and logistic regression-derived models was lower than particular machine learning and deep learning models, our models employed a smaller set of features than earlier research endeavors. Furthermore, our proposed models offer several advantages over previous models, including low computational complexity, simple implementation, robustness to noise, and reduced data requirements This study is the first to use basic statistical models (linear and logistic regression) to profile Malicious behavior in DoH network traffic.
引用
收藏
页码:1293 / 1316
页数:23
相关论文
共 50 条
  • [1] Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition
    Niktabe, Sepideh
    Lashkari, Arash Habibi
    Sharma, Dilli Prasad
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (02) : 1293 - 1316
  • [2] Real time detection of malicious DoH traffic using statistical analysis
    Moure-Garrido, Marta
    Campo, Celeste
    Garcia-Rubio, Carlos
    [J]. COMPUTER NETWORKS, 2023, 234
  • [3] Malicious DNS Tunnel Tool Recognition Using Persistent DoH Traffic Analysis
    Mitsuhashi, Rikima
    Jin, Yong
    Iida, Katsuyoshi
    Shinagawa, Takahiro
    Takai, Yoshiaki
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (02): : 2086 - 2095
  • [4] Unveiling DoH tunnel: Toward generating a balanced DoH encrypted traffic dataset and profiling malicious behavior using inherently interpretable machine learning
    Sepideh Niktabe
    Arash Habibi Lashkari
    Arousha Haghighian Roudsari
    [J]. Peer-to-Peer Networking and Applications, 2024, 17 : 507 - 531
  • [5] Unveiling DoH tunnel: Toward generating a balanced DoH encrypted traffic dataset and profiling malicious behavior using inherently interpretable machine learning
    Niktabe, Sepideh
    Lashkari, Arash Habibi
    Roudsari, Arousha Haghighian
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (01) : 507 - 531
  • [6] Detecting malicious DoH traffic: Leveraging small sample analysis and adversarial networks for detection
    Wu, Shaoqian
    Wang, Wei
    Ding, Zhanmeng
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 84
  • [7] Research on malicious traffic detection based on image recognition
    Li, Wei
    Chen, Yuliang
    Zhao, Lixin
    Luo, Yazhou
    Liu, Xin
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2023, 16 (02) : 134 - 142
  • [8] Detection of DoH Traffic Tunnels Using Deep Learning for Encrypted Traffic Classification
    Alzighaibi, Ahmad Reda
    [J]. COMPUTERS, 2023, 12 (03)
  • [9] Identifying Malicious DNS Tunnel Tools from DoH Traffic Using Hierarchical Machine Learning Classification
    Mitsuhashi, Rikima
    Satoh, Akihiro
    Jin, Yong
    Iida, Katsuyoshi
    Shinagawa, Takahiro
    Takai, Yoshiaki
    [J]. INFORMATION SECURITY (ISC 2021), 2021, 13118 : 238 - 256
  • [10] Detecting malicious packet dropping using statistical traffic patterns
    Julian, Benadit P.
    Sharmila, Baskaran
    Ramya, Taimanessamy
    [J]. International Journal of Computer Science Issues, 2011, 8 (3 3-2): : 121 - 126