Journal on Communications ›› 2013, Vol. 34 ›› Issue (5): 143-151.doi: 10.3969/j.issn.1000-436x.2013.05.017

• Technical Report • Previous Articles     Next Articles

Detecting DNS-based covert channel on live traffic

Si-yu ZHANG1,Fu-tai1 ZOU1,Lu-hua WANG2,Ming CHEN3   

  1. 1 School of Information Security,Shanghai Jiaotong University,Shanghai 200240,China;
    2 National Computer Network and Information Security Administration Center,Beijing 100017,China;
    3 UM-SJTU Joint Institute,Shanghai Jiaotong University,Shanghai 200240,China
  • Online:2013-05-25 Published:2017-06-27
  • Supported by:
    The National Natural Science Foundation of China;The National 242 Information Security Plan;The Open Project of MPS Key Laboratory of Information Network Security

Abstract:

To propose an effective detection method for DNS-based covert channel,traffic characteristics were thor-oughly studied.12 features were extracted from DNS packets to distinguish covert channels from legitimate DNS queries.Statistical characteristics of these features are used as input of the machine learning classifier.Experimental results show that the decision tree model detects all 22 covert channels used in training,and is capable of detecting untrained covert channels.Several DNS tunnels were detected during the evaluation on campus network's live DNS traffic.

Key words: domain name system, covert channel, intrusion detection, machine learning, network security

No Suggested Reading articles found!