Detecting abnormal DNS traffic using unsupervised machine learning - Service IntEgration and netwoRk Administration Accéder directement au contenu
Communication Dans Un Congrès Année : 2020

Detecting abnormal DNS traffic using unsupervised machine learning

Résumé

Nowadays, complex attacks like Advanced Persistent Threats (APTs) often use tunneling techniques to avoid being detected by security systems like Intrusion Detection System (IDS), Security Event Information Management (SIEMs) or firewalls. Companies try to identify these APTs by defining rules on their intrusion detection system, but it is a hard task that requires a lot of time and effort. In this study, we compare the performance of four unsupervised machine-learning algorithms: K-means, Gaussian Mixture Model (GMM), Density-Based Spatial Clustering of Applications with Noise (DBSCAN), and Local Outlier Factor (LOF) on the Boss of the SOC Dataset Version 1 (Botsv1) dataset of the Splunk project to detect malicious DNS traffics. Then we propose an approach that combines DBSCAN and K Nearest Neighbor (KNN) to achieve 100% detection rate and between 1.6% and 2.3% false-positive rate. A simple post-analysis consisting in ranking the IP addresses according to the number of requests or volume of bytes sent determines the infected machines.
Fichier principal
Vignette du fichier
Detecting abnormal DNS traffic using unsupervised machine learning.pdf (7.39 Mo) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

hal-03184957 , version 1 (30-03-2021)

Identifiants

Citer

Thi Quynh Nguyen, Romain Laborde, Abdelmalek Benzekri, Bruno Qu’hen. Detecting abnormal DNS traffic using unsupervised machine learning. 4th Cyber Security in Networking Conference: Cyber Security in Networking (CSNet 2020), IEEE Communications Society, Oct 2020, Lausanne, Switzerland. pp.1-8, ⟨10.1109/CSNet50428.2020.9265466⟩. ⟨hal-03184957⟩
201 Consultations
188 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More