Cargando…
A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach
The Domain Name System (DNS) protocol essentially translates domain names to IP addresses, enabling browsers to load and utilize Internet resources. Despite its major role, DNS is vulnerable to various security loopholes that attackers have continually abused. Therefore, delivering secure DNS traffi...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10098885/ https://www.ncbi.nlm.nih.gov/pubmed/37050549 http://dx.doi.org/10.3390/s23073489 |
_version_ | 1785024921418596352 |
---|---|
author | Abu Al-Haija, Qasem Alohaly, Manar Odeh, Ammar |
author_facet | Abu Al-Haija, Qasem Alohaly, Manar Odeh, Ammar |
author_sort | Abu Al-Haija, Qasem |
collection | PubMed |
description | The Domain Name System (DNS) protocol essentially translates domain names to IP addresses, enabling browsers to load and utilize Internet resources. Despite its major role, DNS is vulnerable to various security loopholes that attackers have continually abused. Therefore, delivering secure DNS traffic has become challenging since attackers use advanced and fast malicious information-stealing approaches. To overcome DNS vulnerabilities, the DNS over HTTPS (DoH) protocol was introduced to improve the security of the DNS protocol by encrypting the DNS traffic and communicating it over a covert network channel. This paper proposes a lightweight, double-stage scheme to identify malicious DoH traffic using a hybrid learning approach. The system comprises two layers. At the first layer, the traffic is examined using random fine trees (RF) and identified as DoH traffic or non-DoH traffic. At the second layer, the DoH traffic is further investigated using Adaboost trees (ADT) and identified as benign DoH or malicious DoH. Specifically, the proposed system is lightweight since it works with the least number of features (using only six out of thirty-three features) selected using principal component analysis (PCA) and minimizes the number of samples produced using a random under-sampling (RUS) approach. The experiential evaluation reported a high-performance system with a predictive accuracy of 99.4% and 100% and a predictive overhead of 0.83 µs and 2.27 µs for layer one and layer two, respectively. Hence, the reported results are superior and surpass existing models, given that our proposed model uses only 18% of the feature set and 17% of the sample set, distributed in balanced classes. |
format | Online Article Text |
id | pubmed-10098885 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-100988852023-04-14 A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach Abu Al-Haija, Qasem Alohaly, Manar Odeh, Ammar Sensors (Basel) Article The Domain Name System (DNS) protocol essentially translates domain names to IP addresses, enabling browsers to load and utilize Internet resources. Despite its major role, DNS is vulnerable to various security loopholes that attackers have continually abused. Therefore, delivering secure DNS traffic has become challenging since attackers use advanced and fast malicious information-stealing approaches. To overcome DNS vulnerabilities, the DNS over HTTPS (DoH) protocol was introduced to improve the security of the DNS protocol by encrypting the DNS traffic and communicating it over a covert network channel. This paper proposes a lightweight, double-stage scheme to identify malicious DoH traffic using a hybrid learning approach. The system comprises two layers. At the first layer, the traffic is examined using random fine trees (RF) and identified as DoH traffic or non-DoH traffic. At the second layer, the DoH traffic is further investigated using Adaboost trees (ADT) and identified as benign DoH or malicious DoH. Specifically, the proposed system is lightweight since it works with the least number of features (using only six out of thirty-three features) selected using principal component analysis (PCA) and minimizes the number of samples produced using a random under-sampling (RUS) approach. The experiential evaluation reported a high-performance system with a predictive accuracy of 99.4% and 100% and a predictive overhead of 0.83 µs and 2.27 µs for layer one and layer two, respectively. Hence, the reported results are superior and surpass existing models, given that our proposed model uses only 18% of the feature set and 17% of the sample set, distributed in balanced classes. MDPI 2023-03-27 /pmc/articles/PMC10098885/ /pubmed/37050549 http://dx.doi.org/10.3390/s23073489 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Abu Al-Haija, Qasem Alohaly, Manar Odeh, Ammar A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach |
title | A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach |
title_full | A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach |
title_fullStr | A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach |
title_full_unstemmed | A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach |
title_short | A Lightweight Double-Stage Scheme to Identify Malicious DNS over HTTPS Traffic Using a Hybrid Learning Approach |
title_sort | lightweight double-stage scheme to identify malicious dns over https traffic using a hybrid learning approach |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10098885/ https://www.ncbi.nlm.nih.gov/pubmed/37050549 http://dx.doi.org/10.3390/s23073489 |
work_keys_str_mv | AT abualhaijaqasem alightweightdoublestageschemetoidentifymaliciousdnsoverhttpstrafficusingahybridlearningapproach AT alohalymanar alightweightdoublestageschemetoidentifymaliciousdnsoverhttpstrafficusingahybridlearningapproach AT odehammar alightweightdoublestageschemetoidentifymaliciousdnsoverhttpstrafficusingahybridlearningapproach AT abualhaijaqasem lightweightdoublestageschemetoidentifymaliciousdnsoverhttpstrafficusingahybridlearningapproach AT alohalymanar lightweightdoublestageschemetoidentifymaliciousdnsoverhttpstrafficusingahybridlearningapproach AT odehammar lightweightdoublestageschemetoidentifymaliciousdnsoverhttpstrafficusingahybridlearningapproach |