Can We Detect Malicious Behaviours in Encrypted DNS Tunnels Using Network Flow Entropy?

2Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.

Abstract

This paper explores the concept of entropy of a flow to augment flow statistical features for encrypted DNS tunnelling detection, specifically DNS over HTTPS traffic. To achieve this, the use of flow exporters, namely Argus, DoHlyzer and Tranalyzer2 are studied. Statistical flow features automatically generated by the aforementioned tools are then augmented with the flow entropy. In this work, flow entropy is calculated using three different techniques: (i) entropy over all packets of a flow, (ii) entropy over the first 96 bytes of a flow, and (iii) entropy over the first n-packets of a flow. These features are provided as input to ML classifiers to detect malicious behaviours over four publicly available datasets. This model is optimized using TPOT-AutoML system, where the Random Forest classifier provided the best performance achieving an average F-measure of 98% over all testing datasets employed.

Cite

CITATION STYLE

APA

Khodjaeva, Y., Zincir-Heywood, N., & Zincir, I. (2022). Can We Detect Malicious Behaviours in Encrypted DNS Tunnels Using Network Flow Entropy? Journal of Cyber Security and Mobility, 11(3), 461–495. https://doi.org/10.13052/jcsm2245-1439.1135

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free