Malicious traffic Detection of DNS over HTTPS using Ensemble Machine Learning

12Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.

Abstract

As the Internet is growing very fast, the Domain Name System remains under constant attacks and day by day its vulnerability is increasing. In the cyberattacks, it has been shown that the maximum attackers make target on Domain Name System. Several security add-ons came with DNS to secure it, but we have not come across any robust solution until now. DNS over HTTPS and DNS over TLS are introduced recently with encrypted DNS to reduce the visibility of DNS requests. DNS over HTTPS has been designed to mitigate the DNS security issues but it has own drawbacks like it bypasses the local firewalls. However, DNS over HTTPS is a popular protocol now, but it is also vulnerable. This paper presents a Machine Learning approach to detect. DNS over HTTPS traffic and to filter it into Benign-DNS over HTTPS traffic and Malicious-DNS over HTTPS traffic using ensemble machine learning algorithms. To find the best prediction results, we have applied various ML models such as; (i) Decision tree, ii) Logistic regression, (iii) K nearest neighboring, and (iv) Random forest. Several evaluation metrics have been considered to analyze the performance, like precision, recall, F1-score, and confusion matrix. The results analysis is carried out on a benchmark DNS over HTTPS dataset (CIRA-CIC-DoHBrw-2020) with 30 extracted features. To make this model robust, several parameters are used to check its performance. An ensemble learning-based RF classifier emerge as the best-suited model with 100% accuracy. The outcomes of the proposed ensemble learning model confirmed that it is the best choice to secure the DNS over HTTPS based DNS attacks because this model detected most malicious activities.

References Powered by Scopus

Random forests

96252Citations
N/AReaders
Get full text

A Survey of Decision Tree Classifier Methodology

3079Citations
N/AReaders
Get full text

Use of k-nearest neighbor classifier for intrusion detection

652Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition

4Citations
N/AReaders
Get full text

A novel deep-learning based approach to DNS over HTTPS network traffic detection

1Citations
N/AReaders
Get full text

Detecting malicious DoH traffic: Leveraging small sample analysis and adversarial networks for detection

1Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Singh, S. K., & Roy, P. K. (2022). Malicious traffic Detection of DNS over HTTPS using Ensemble Machine Learning. International Journal of Computing and Digital Systems, 11(1), 1061–1069. https://doi.org/10.12785/ijcds/110185

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 3

75%

Lecturer / Post doc 1

25%

Readers' Discipline

Tooltip

Computer Science 6

86%

Engineering 1

14%

Save time finding and organizing research with Mendeley

Sign up for free