Cargando…

DNS Tunnelling, Exfiltration and Detection over Cloud Environments

The domain name system (DNS) protocol is fundamental to the operation of the internet, however, in recent years various methodologies have been developed that enable DNS attacks on organisations. In the last few years, the increased use of cloud services by organisations has created further security...

Descripción completa

Detalles Bibliográficos
Autores principales: Salat, Lehel, Davis, Mastaneh, Khan, Nabeel
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10007605/
https://www.ncbi.nlm.nih.gov/pubmed/36904959
http://dx.doi.org/10.3390/s23052760
_version_ 1784905564132737024
author Salat, Lehel
Davis, Mastaneh
Khan, Nabeel
author_facet Salat, Lehel
Davis, Mastaneh
Khan, Nabeel
author_sort Salat, Lehel
collection PubMed
description The domain name system (DNS) protocol is fundamental to the operation of the internet, however, in recent years various methodologies have been developed that enable DNS attacks on organisations. In the last few years, the increased use of cloud services by organisations has created further security challenges as cyber criminals use numerous methodologies to exploit cloud services, configurations and the DNS protocol. In this paper, two different DNS tunnelling methods, Iodine and DNScat, have been conducted in the cloud environment (Google and AWS) and positive results of exfiltration have been achieved under different firewall configurations. Detection of malicious use of DNS protocol can be a challenge for organisations with limited cybersecurity support and expertise. In this study, various DNS tunnelling detection techniques were utilised in a cloud environment to create an effective monitoring system with a reliable detection rate, low implementation cost, and ease of use for organisations with limited detection capabilities. The Elastic stack (an open-source framework) was used to configure a DNS monitoring system and to analyse the collected DNS logs. Furthermore, payload and traffic analysis techniques were implemented to identify different tunnelling methods. This cloud-based monitoring system offers various detection techniques that can be used for monitoring DNS activities of any network especially accessible to small organisations. Moreover, the Elastic stack is open-source and it has no limitation with regards to the data that can be uploaded daily.
format Online
Article
Text
id pubmed-10007605
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-100076052023-03-12 DNS Tunnelling, Exfiltration and Detection over Cloud Environments Salat, Lehel Davis, Mastaneh Khan, Nabeel Sensors (Basel) Article The domain name system (DNS) protocol is fundamental to the operation of the internet, however, in recent years various methodologies have been developed that enable DNS attacks on organisations. In the last few years, the increased use of cloud services by organisations has created further security challenges as cyber criminals use numerous methodologies to exploit cloud services, configurations and the DNS protocol. In this paper, two different DNS tunnelling methods, Iodine and DNScat, have been conducted in the cloud environment (Google and AWS) and positive results of exfiltration have been achieved under different firewall configurations. Detection of malicious use of DNS protocol can be a challenge for organisations with limited cybersecurity support and expertise. In this study, various DNS tunnelling detection techniques were utilised in a cloud environment to create an effective monitoring system with a reliable detection rate, low implementation cost, and ease of use for organisations with limited detection capabilities. The Elastic stack (an open-source framework) was used to configure a DNS monitoring system and to analyse the collected DNS logs. Furthermore, payload and traffic analysis techniques were implemented to identify different tunnelling methods. This cloud-based monitoring system offers various detection techniques that can be used for monitoring DNS activities of any network especially accessible to small organisations. Moreover, the Elastic stack is open-source and it has no limitation with regards to the data that can be uploaded daily. MDPI 2023-03-02 /pmc/articles/PMC10007605/ /pubmed/36904959 http://dx.doi.org/10.3390/s23052760 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Salat, Lehel
Davis, Mastaneh
Khan, Nabeel
DNS Tunnelling, Exfiltration and Detection over Cloud Environments
title DNS Tunnelling, Exfiltration and Detection over Cloud Environments
title_full DNS Tunnelling, Exfiltration and Detection over Cloud Environments
title_fullStr DNS Tunnelling, Exfiltration and Detection over Cloud Environments
title_full_unstemmed DNS Tunnelling, Exfiltration and Detection over Cloud Environments
title_short DNS Tunnelling, Exfiltration and Detection over Cloud Environments
title_sort dns tunnelling, exfiltration and detection over cloud environments
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10007605/
https://www.ncbi.nlm.nih.gov/pubmed/36904959
http://dx.doi.org/10.3390/s23052760
work_keys_str_mv AT salatlehel dnstunnellingexfiltrationanddetectionovercloudenvironments
AT davismastaneh dnstunnellingexfiltrationanddetectionovercloudenvironments
AT khannabeel dnstunnellingexfiltrationanddetectionovercloudenvironments