Netinfo Security ›› 2019, Vol. 19 ›› Issue (8): 76-82.doi: 10.3969/j.issn.1671-1122.2019.08.011

Previous Articles     Next Articles

Requested Domain Name-based DNS Covert Channel Detection

Hang ZHANG1, Rongfeng ZHENG2, Hua PENG2, Jiayong LIU1()   

  1. 1. College of Cybersecurity, Sichuan University, Chengdu Sichuan 610065, China
    2. College of Electronics and Information, Sichuan University, Chengdu Sichuan 610065, China
  • Received:2019-04-10 Online:2019-08-10 Published:2020-05-11

Abstract:

In order to improve the accuracy of the machine hidden learning channel in real time, and improve the detection ability of the machine learning model to deal with the unknown type of DNS covert channel, this paper proposed a DNS covert channel detection method based on the requested domain name. Taking the DNS covert channel as the research object, through research and analysis of the request domain name in the DNS legal sample and the covert channel sample,this paper utilized relevant information in the request domain name to build features, including domain name length, character proportion, randomness feature, and semantic feature composition, then used the machine learning algorithm to detect the DNS covert channel. This paper first evaluated the proposed method using data collected from the three most commonly used DNS covert channel tools Iodine, Dns2tcp and DNSCat and trained a decision tree classifier, covering computer network, information hiding, anomaly detection, data mining, natural language processing and other research areas. Evaluation results showsthat the model’s precision, recall, accuracyand ability to identify untrained DNS covert channels have been improved.

Key words: domain name system, covert channel, request domain name, decision tree

CLC Number: