A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach
Author:
Abu Al-Haija Qasem1ORCID, Alohaly Manar2ORCID, Odeh Ammar3ORCID
Affiliation:
1. Department of Cybersecurity, Princess Sumaya University for Technology (PSUT), Amman 11941, Jordan 2. Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia 3. Department of Computer Science, Princess Sumaya University for Technology (PSUT), Amman 11941, Jordan
Abstract
The Domain Name System (DNS) protocol essentially translates domain names to IP addresses, enabling browsers to load and utilize Internet resources. Despite its major role, DNS is vulnerable to various security loopholes that attackers have continually abused. Therefore, delivering secure DNS traffic has become challenging since attackers use advanced and fast malicious information-stealing approaches. To overcome DNS vulnerabilities, the DNS over HTTPS (DoH) protocol was introduced to improve the security of the DNS protocol by encrypting the DNS traffic and communicating it over a covert network channel. This paper proposes a lightweight, double-stage scheme to identify malicious DoH traffic using a hybrid learning approach. The system comprises two layers. At the first layer, the traffic is examined using random fine trees (RF) and identified as DoH traffic or non-DoH traffic. At the second layer, the DoH traffic is further investigated using Adaboost trees (ADT) and identified as benign DoH or malicious DoH. Specifically, the proposed system is lightweight since it works with the least number of features (using only six out of thirty-three features) selected using principal component analysis (PCA) and minimizes the number of samples produced using a random under-sampling (RUS) approach. The experiential evaluation reported a high-performance system with a predictive accuracy of 99.4% and 100% and a predictive overhead of 0.83 µs and 2.27 µs for layer one and layer two, respectively. Hence, the reported results are superior and surpass existing models, given that our proposed model uses only 18% of the feature set and 17% of the sample set, distributed in balanced classes.
Funder
Princess Nourah bint Abdulrahman University Researchers Supporting Project number
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference60 articles.
1. Jose, G.-L., Mary, K.S., and Carol, A.W. (1989). The Domain Name System (DNS) Handbook, DTIC. 2. Paul, M. (1987). Domain Names—Implementation and Specification, ISI. Internet Engineering Task Force. 3. Survey on DNS-Specific Security Issues and Solution Approaches;Jat;Data Science and Security,2021 4. Romain, F. (2022). DNS Security for Business Continuity and Resilience, IDC. 5. Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D., and Hoffman, P.E. (2016). Specification for DNS over Transport Layer Security (TLS), Internet Engineering Task Force.
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|