Summary of DNS over HTTPS abuse

K Hynek, D Vekshin, J Luxemburk, T Cejka… - IEEE …, 2022 - ieeexplore.ieee.org
The Internet Engineering Task Force adopted the DNS over HTTPS protocol in 2018 to
remediate privacy issues regarding the plain text transmission of the DNS protocol …

[HTML][HTML] A lightweight double-stage scheme to identify malicious DNS over HTTPS traffic using a hybrid learning approach

Q Abu Al-Haija, M Alohaly, A Odeh - Sensors, 2023 - mdpi.com
The Domain Name System (DNS) protocol essentially translates domain names to IP
addresses, enabling browsers to load and utilize Internet resources. Despite its major role …

Malicious DNS tunnel tool recognition using persistent DoH traffic analysis

R Mitsuhashi, Y Jin, K Iida… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
DNS over HTTPS (Do) can mitigate the risk of privacy breaches but makes it difficult to
control network security services due to the DNS traffic encryption. However, since malicious …

Measuring the accessibility of domain name encryption and its impact on internet filtering

NP Hoang, M Polychronakis, P Gill - International Conference on Passive …, 2022 - Springer
Most online communications rely on DNS to map domain names to their hosting IP address
(es). Previous work has shown that DNS-based network interference is widespread due to …

Classification and characterization of encoded traffic in SCADA network using hybrid deep learning scheme

LAC Ahakonye, GC Amaizu… - Journal of …, 2024 - ieeexplore.ieee.org
The domain name system (DNS) has evolved into an essential component of network
communications, as well as a critical component of critical industrial systems (CIS) and …

Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition

S Niktabe, AH Lashkari, DP Sharma - International Journal of Information …, 2024 - Springer
The domain name system (DNS) protocol has been used for over three decades. It plays a
vital role in the functioning of the Internet by facilitating the conversion of domain names into …

[HTML][HTML] Real time detection of malicious DoH traffic using statistical analysis

M Moure-Garrido, C Campo, C Garcia-Rubio - Computer Networks, 2023 - Elsevier
The DNS protocol plays a fundamental role in the operation of ubiquitous networks. All
devices connected to these networks need DNS to work, both for traditional domain name to …

Detecting malicious use of DOH tunnels using statistical traffic analysis

M Moure-Garrido, C Campo… - Proceedings of the 19th …, 2022 - dl.acm.org
DNS plays a fundamental role in the operation of ubiquitous networks. All devices
connected to these networks need DNS to work, both for traditional domain name to IP …

GAT-DNS: DNS Multivariate Time Series Prediction Model Based on Graph Attention Network

X Lu, X Zhang, P Lio - Companion Proceedings of the ACM Web …, 2023 - dl.acm.org
As one of the most basic services of the Internet, DNS has suffered a lot of attacks. Existing
attack detection methods rely on the learning of malicious samples, so it is difficult to detect …

Real-time Threat Detection Strategies for Resource-constrained Devices

M Hamidouche, BF Demissie, B Cherif - arXiv preprint arXiv:2403.15078, 2024 - arxiv.org
As more devices connect to the internet, it becomes crucial to address their limitations and
basic security needs. While much research focuses on utilizing ML and DL to tackle security …