Cargando…

A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach

The Domain Name System (DNS) protocol essentially translates domain names to IP addresses, enabling browsers to load and utilize Internet resources. Despite its major role, DNS is vulnerable to various security loopholes that attackers have continually abused. Therefore, delivering secure DNS traffi...

Descripción completa

Detalles Bibliográficos
Autores principales: Abu Al-Haija, Qasem, Alohaly, Manar, Odeh, Ammar
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10098885/
https://www.ncbi.nlm.nih.gov/pubmed/37050549
http://dx.doi.org/10.3390/s23073489
_version_ 1785024921418596352
author Abu Al-Haija, Qasem
Alohaly, Manar
Odeh, Ammar
author_facet Abu Al-Haija, Qasem
Alohaly, Manar
Odeh, Ammar
author_sort Abu Al-Haija, Qasem
collection PubMed
description The Domain Name System (DNS) protocol essentially translates domain names to IP addresses, enabling browsers to load and utilize Internet resources. Despite its major role, DNS is vulnerable to various security loopholes that attackers have continually abused. Therefore, delivering secure DNS traffic has become challenging since attackers use advanced and fast malicious information-stealing approaches. To overcome DNS vulnerabilities, the DNS over HTTPS (DoH) protocol was introduced to improve the security of the DNS protocol by encrypting the DNS traffic and communicating it over a covert network channel. This paper proposes a lightweight, double-stage scheme to identify malicious DoH traffic using a hybrid learning approach. The system comprises two layers. At the first layer, the traffic is examined using random fine trees (RF) and identified as DoH traffic or non-DoH traffic. At the second layer, the DoH traffic is further investigated using Adaboost trees (ADT) and identified as benign DoH or malicious DoH. Specifically, the proposed system is lightweight since it works with the least number of features (using only six out of thirty-three features) selected using principal component analysis (PCA) and minimizes the number of samples produced using a random under-sampling (RUS) approach. The experiential evaluation reported a high-performance system with a predictive accuracy of 99.4% and 100% and a predictive overhead of 0.83 µs and 2.27 µs for layer one and layer two, respectively. Hence, the reported results are superior and surpass existing models, given that our proposed model uses only 18% of the feature set and 17% of the sample set, distributed in balanced classes.
format Online
Article
Text
id pubmed-10098885
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-100988852023-04-14 A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach Abu Al-Haija, Qasem Alohaly, Manar Odeh, Ammar Sensors (Basel) Article The Domain Name System (DNS) protocol essentially translates domain names to IP addresses, enabling browsers to load and utilize Internet resources. Despite its major role, DNS is vulnerable to various security loopholes that attackers have continually abused. Therefore, delivering secure DNS traffic has become challenging since attackers use advanced and fast malicious information-stealing approaches. To overcome DNS vulnerabilities, the DNS over HTTPS (DoH) protocol was introduced to improve the security of the DNS protocol by encrypting the DNS traffic and communicating it over a covert network channel. This paper proposes a lightweight, double-stage scheme to identify malicious DoH traffic using a hybrid learning approach. The system comprises two layers. At the first layer, the traffic is examined using random fine trees (RF) and identified as DoH traffic or non-DoH traffic. At the second layer, the DoH traffic is further investigated using Adaboost trees (ADT) and identified as benign DoH or malicious DoH. Specifically, the proposed system is lightweight since it works with the least number of features (using only six out of thirty-three features) selected using principal component analysis (PCA) and minimizes the number of samples produced using a random under-sampling (RUS) approach. The experiential evaluation reported a high-performance system with a predictive accuracy of 99.4% and 100% and a predictive overhead of 0.83 µs and 2.27 µs for layer one and layer two, respectively. Hence, the reported results are superior and surpass existing models, given that our proposed model uses only 18% of the feature set and 17% of the sample set, distributed in balanced classes. MDPI 2023-03-27 /pmc/articles/PMC10098885/ /pubmed/37050549 http://dx.doi.org/10.3390/s23073489 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Abu Al-Haija, Qasem
Alohaly, Manar
Odeh, Ammar
A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach
title A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach
title_full A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach
title_fullStr A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach
title_full_unstemmed A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach
title_short A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach
title_sort lightweight double-stage scheme to identify malicious dns over https traffic using a hybrid learning approach
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10098885/
https://www.ncbi.nlm.nih.gov/pubmed/37050549
http://dx.doi.org/10.3390/s23073489
work_keys_str_mv AT abualhaijaqasem alightweightdoublestageschemetoidentifymaliciousdnsoverhttpstrafficusingahybridlearningapproach
AT alohalymanar alightweightdoublestageschemetoidentifymaliciousdnsoverhttpstrafficusingahybridlearningapproach
AT odehammar alightweightdoublestageschemetoidentifymaliciousdnsoverhttpstrafficusingahybridlearningapproach
AT abualhaijaqasem lightweightdoublestageschemetoidentifymaliciousdnsoverhttpstrafficusingahybridlearningapproach
AT alohalymanar lightweightdoublestageschemetoidentifymaliciousdnsoverhttpstrafficusingahybridlearningapproach
AT odehammar lightweightdoublestageschemetoidentifymaliciousdnsoverhttpstrafficusingahybridlearningapproach