Intelligent techniques for detecting network attacks: review and research directions

M Aljabri, SS Aljameel, RMA Mohammad, SH Almotiri… - Sensors, 2021 - mdpi.com
The significant growth in the use of the Internet and the rapid development of network
technologies are associated with an increased risk of network attacks. Network attacks refer …

A survey on DNS encryption: Current development, malware misuse, and inference techniques

M Lyu, HH Gharakheili, V Sivaraman - ACM Computing Surveys, 2022 - dl.acm.org
The domain name system (DNS) that maps alphabetic names to numeric Internet Protocol
(IP) addresses plays a foundational role in Internet communications. By default, DNS …

Interpretable machine learning models for malicious domains detection using explainable artificial intelligence (XAI)

N Aslam, IU Khan, S Mirza, A AlOwayed, FM Anis… - Sustainability, 2022 - mdpi.com
With the expansion of the internet, a major threat has emerged involving the spread of
malicious domains intended by attackers to perform illegal activities aiming to target …

A lightweight double-stage scheme to identify malicious DNS over HTTPS traffic using a hybrid learning approach

Q Abu Al-Haija, M Alohaly, A Odeh - Sensors, 2023 - mdpi.com
The Domain Name System (DNS) protocol essentially translates domain names to IP
addresses, enabling browsers to load and utilize Internet resources. Despite its major role …

Summary of DNS over HTTPS abuse

K Hynek, D Vekshin, J Luxemburk, T Cejka… - IEEE …, 2022 - ieeexplore.ieee.org
The Internet Engineering Task Force adopted the DNS over HTTPS protocol in 2018 to
remediate privacy issues regarding the plain text transmission of the DNS protocol …

Large scale measurement on the adoption of encrypted DNS

S García, K Hynek, D Vekshin, T Čejka… - arXiv preprint arXiv …, 2021 - arxiv.org
Several encryption proposals for DNS have been presented since 2016, but their adoption
was not comprehensively studied yet. This research measured the current adoption of DoH …

DoH tunneling detection system for enterprise network using deep learning technique

TA Nguyen, M Park - Applied Sciences, 2022 - mdpi.com
In spite of protection mechanisms for Domain Name System (DNS), such as IP blacklist and
DNS Firewall, DNS still has privacy issues in reality, since DNS is a plain-text protocol …

Malicious DNS tunnel tool recognition using persistent DoH traffic analysis

R Mitsuhashi, Y Jin, K Iida… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
DNS over HTTPS (Do) can mitigate the risk of privacy breaches but makes it difficult to
control network security services due to the DNS traffic encryption. However, since malicious …

Identifying malicious dns tunnel tools from doh traffic using hierarchical machine learning classification

R Mitsuhashi, A Satoh, Y Jin, K Iida… - … Conference, ISC 2021 …, 2021 - Springer
Although the DNS over HTTPS (DoH) protocol has desirable properties for Internet users
such as privacy and security, it also causes a problem in that network administrators are …

Classifying DNS tunneling tools for malicious DoH traffic

R Alenezi, SA Ludwig - 2021 IEEE Symposium Series on …, 2021 - ieeexplore.ieee.org
Cyber adversaries continuously seek new ways to penetrate security systems and infect
computer infrastructure. The past decade has witnessed a sharp increase in attacks …