DNS Tunneling Detection Techniques – Classification, and Theoretical Comparison in Case of a Real APT Campaign

Domain Name System (DNS) plays an important role as a translation protocol in everyday use of the Internet. The purpose of DNS is to translate domain names into IP addresses and vice versa. However, its simple architecture can easily be misused for malicious activities. One huge security threat concerning DNS is tunneling, which helps attackers bypass the security systems unnoticed. A DNS tunnel can be used for three purposes: as a command and control channel, for data exfiltration or even for tunneling another protocol through it. In this paper, we surveyed different techniques for DNS tunneling detection. We classified those first based on the type of data and then within the categories based on the type of analysis. We conclude with a comparison between the various detection techniques. We introduce one real Advanced Persistent Threat campaign that utilizes DNS tunneling, and theoretically compare how well the surveyed detection techniques could detect it.

Viivi Nuojua, Gil David, Timo Hämäläinen (University of Jyväskylä): DNS Tunneling Detection Techniques – Classification, and Theoretical Comparison in Case of a Real APT Campaign

https://www.researchgate.net/publication/319648174_DNS_Tunneling_Detection_Techniques_-_Classification_and_Theoretical_Comparison_in_Case_of_a_Real_APT_Campaign

Share on LinkedInGoogle+Tweet about this on TwitterShare on FacebookEmail to someone