DNS Tunneling Detection by Cache-Property-Aware Features
DNS Tunneling Detection by Cache-Property-Aware Features
Abstract—Many enterprises are under threat of targeted malware as seemingly harmless attachments to the employees
attacks aiming at data exfiltration. To launch such attacks, in of targeted enterprises. By opening these malicious emails, the
recent years, attackers with their malware have exploited a covert employees unfortunately infect their computers with malware.
channel that abuses the domain name system (DNS) named DNS
tunneling. Although several research efforts have been made to This mistake establishes communication channels between the
detect DNS tunneling, the existing methods rely on features that attackers and their malware. Then, the attackers can remotely
advanced tunneling techniques can easily obfuscate by mimick- control the malware and steal confidential information from
ing legitimate DNS clients. Such obfuscation would result in data the infected enterprises. This data leakage puts enterprises at
leakage. To tackle this problem, we focused on a “trace” left by a great disadvantage and affects profitability drastically.
DNS tunneling that cannot be easily hidden. In the context of data
exfiltration by DNS tunneling, the malware connects directly to In recent years, attackers with malware have launched this
the DNS cache server and the generated DNS tunneling queries form of attack by exploiting a covert channel that abuses the
produce cache misses with absolute certainty. In this study, we domain name system (DNS) known as DNS tunneling [4].
propose a DNS tunneling detection method based on the cache- DNS tunneling is a security threat used to tunnel data and com-
property-aware features. Our experiments show that one of the mands by exploiting a domain name in DNS queries and the
proposed features can efficiently characterize the DNS tunnel-
ing traffic. Furthermore, we introduce a rule-based filter and a corresponding DNS responses. It is one of the top DNS-based
long short-term memory (LSTM)-based filter using this proposed attacks [5]. Between April and September 2014, the attack-
feature. The rule-based filter achieves a higher rate of DNS tun- ers stole 56 million debit and credit card numbers from the
neling attack detection than the LSTM one, which instead detects American retailer, Home Depot [6], and several attacks were
the attack more quickly, while both maintain a low misdetection launched against a Middle Eastern government organization in
rate.
August 2018 [7]. In general, enterprises enforce access control
Index Terms—Cache-property-aware features, data exfiltra- of ports and protocols that are not usually utilized (e.g., peer-
tion, DNS tunneling, targeted attacks. to-peer (P2P) file sharing such as BitTorrent) for employees. In
addition, in a quarantine network that installs trusted middle-
I. I NTRODUCTION boxes, end-to-end encrypted communications can be decrypted
and inspected by middleboxes [8] that can identify malicious
ARIOUS protocols exist on the Internet, and by exploit-
V ing their vulnerabilities, attackers using their malware
launch targeted attacks that cause data exfiltration [2], [3].
activities. However, because DNS is an indispensable protocol
for implementing many services, such as content distribution,
its use is not restricted and is poorly managed. Therefore,
One of the ways attackers can exfiltrate data from an enter- the DNS operation unfortunately provides attackers with mal-
prise network commences with sending emails that include the ware an opportunity to realize targeted attacks through DNS
Manuscript received October 30, 2020; revised March 18, 2021 and April tunneling.
28, 2021; accepted May 4, 2021. Date of publication May 10, 2021; date of To detect DNS tunneling, several countermeasures have
current version June 10, 2021. This project has received funding from JSPS been proposed [9]–[24]. Indeed, these methods are effective
KAKENHI, Grant Number JP19K24351, the European Union’s Horizon 2020
Research and Innovation Programme under Grant Agreement No. 739578 and for detecting tunneling traffic from malware, such as Morto
the Government of the Republic of Cyprus through the Deputy Ministry of worm [25], or DNS tunneling tools such as dnscat2 [26].
Research, Innovation and Digital Policy. This article was presented in part However, these countermeasures are built using features that
at the ICIN [1]. The associate editor coordinating the review of this arti-
cle and approving it for publication was C. Fung. (Corresponding author: can be easily obfuscated by advanced DNS tunneling tech-
Daishi Kondo.) niques. For instance, steganography can hide leaked data in the
Naotake Ishikura and Daishi Kondo are with Department of Computer fully qualified domain name (FQDN) of the tunneling query,
Science and Intelligent Systems, Osaka Prefecture University, Sakai 599-8531,
Japan (e-mail: [email protected]; [email protected] which makes the FQDN look legitimate and invalidates filters
u.ac.jp). relying on its features. Thus, this obfuscation would result in
Vassilis Vassiliades is with the CYENS Centre of Excellence, 1500 Nicosia, data leakage.
Cyprus (e-mail: [email protected]).
Iordan Iordanov is with Corpy & Co., Tokyo 113-0033, Japan (e-mail: To address this problem, we focus on the nature of DNS tun-
[email protected]). neling. To successfully exfiltrate data attached to the domain
Hideki Tode is with the Department of Computer Science and Intelligent name of a DNS query, the DNS cache server to which the
Systems, Osaka Prefecture University, Sakai 599-8531, Japan (e-mail:
[email protected]). malware connects directly must avoid producing a cache hit
Digital Object Identifier 10.1109/TNSM.2021.3078428 in the server; otherwise, the data cannot be leaked outside of
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
1204 IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, VOL. 18, NO. 2, JUNE 2021
the enterprises. In other words, leaking data through DNS tun- of the features of DNS tunneling, a rule-based filter and an
neling would trigger a cache miss on the DNS cache server. LSTM filter are proposed in Section V. The performance of
However, cache servers exist to exploit the natural tendency the filters is evaluated in Section VI. We discuss our findings
of humans to request the same information multiple times. in Section VII and conclude the paper in Section VIII.
We hypothesize that the number of queries satisfies Zipf’s
law [27]. Based on this hypothesis, DNS tunneling violates
normal human behavior because it requires the cache to be II. BACKGROUND
bypassed, a clear indication that cache misses are the actual A. DNS Tunneling Basics
footprint of a DNS tunneling attack. Therefore, we believe that DNS tunneling bypasses firewalls to send and receive data
this cache property is more tolerant than the features used in by exploiting the domain names included in the DNS query
conventional methods to counter feature obfuscation. and the corresponding DNS response. The data and commands
Considering the above facts, we propose three features are tunneled between the malware and the attacker in the
derived from the cache property: cache hit ratio, access hit context of targeted attacks causing data exfiltration (Fig. 1).
ratio, and access miss count. Through extensive experiments, Assuming a domain name attacker.com is shared to cre-
we demonstrate that the access miss count addresses some ate a covert channel between the attacker and the malware
shortcomings of the hit ratios of both the cache and access that has infiltrated the enterprise network, to obtain a com-
and clearly characterizes DNS tunneling traffic. Therefore, it mand from the attacker to search confidential information
is useful for designing and implementing a solid DNS firewall in the enterprise network, the malware generates an FQDN
against DNS tunneling. Based on this knowledge, we introduce (get_command).attacker.com and sends it as a DNS
a rule-based filter and a long short-term memory (LSTM) [28]- query to the DNS cache server in the enterprise network
based filter using the proposed feature. The rule-based filter (Step 1). Following the usual process of resolving an FQDN,
achieves a higher detection rate of DNS tunneling attack than the DNS cache server iteratively queries the root (Steps 2
the LSTM filter, which instead detects the attack faster, while and 3), the com (Steps 4 and 5), and the attacker.com
both maintain a low misdetection rate. DNS server (Step 6). Then, the attacker.com DNS server
To the best of our knowledge, our previous work [1] was the obtains the request (get_command) and replies with a suitable
first to analyze cache-property-aware features, and this paper DNS response containing the command to the malware via
is an extended version. We extend the previous work with the the DNS cache server (Steps 7 and 8). After repeating the
following contributions. process of obtaining a new command and sending an answer
• performing a comprehensive survey of DNS tunneling to the command, the malware eventually leaks the confiden-
research in terms of attack and detection methods, tial information collected by the attacker in the same manner
• introducing a new cache-property-aware feature, access (i.e., by including the information to be leaked in the domain
miss count, and comparing this feature with the cache name).
hit ratio and access hit ratio, When a DNS client resolves the domain name by sending
• proposing a rule-based filter and an LSTM filter based the DNS query, the query first reaches the DNS cache server.
on the access miss count against DNS tunneling, and If the corresponding DNS response is cached in the server, it
• evaluating the performance of the filters created by is a cache hit, that is, the response is directly returned from the
a large legitimate training dataset composed of more server; otherwise, it is a cache miss, that is, the DNS query
than 350,000 DNS queries on the test dataset including is forwarded to the upstream DNS servers (Fig. 2). For the
legitimate queries and DNS tunneling ones. malware to send malicious DNS queries to the attacker effec-
The remainder of this paper is organized as follows. tively, the queries must not cause a cache hit on the DNS cache
Section II is the summary of the basics of DNS tunneling and server; this is a fundamental characteristic of DNS tunneling.
several existing studies on the attack and detection methods In this study, we assumed that the exfiltrated data are simi-
of DNS tunneling. Section III proposes cache-property-aware lar to credit card information (such an attack scenario is also
features for DNS tunneling detection while Section IV per- considered in [18], [21], [23]), and all the FQDNs generated
forms monitoring and analysis of these features. Using one to leak such data are unique.
ISHIKURA et al.: DNS TUNNELING DETECTION BY CACHE-PROPERTY-AWARE FEATURES 1205
TABLE II
C LASSIFIERS
TABLE I
DNS T UNNELING T OOLS AND M ALWARE DATASET
TABLE III
F EATURES
TABLE IV
C RITERIA FOR M AKING F EATURE V ECTORS (I NPUTS ) FOR C LASSIFIERS the cache hit ratio is expected to decrease because the mali-
cious DNS queries generated to exfiltrate data cause cache
misses, as discussed in Section II-A. To the best of our
knowledge, this characteristic of DNS tunneling has not been
investigated in related works, as demonstrated in the review in
Section II-C. In this section, we propose three features based
on the cache property to identify DNS tunneling traffic.
TABLE V
C OMPARISON B ETWEEN A C ACHE E NTRY AND AN ACCESS E NTRY
Fig. 4. Time-series data of CHR 100 of all the clients in Scenario 1 and AHR 100 and AMC 600 of all the clients in Scenarios 1, 2, and 3.
Fig. 5. Time-series data of CHR 100 of the tunneling client in Scenario 1 and AHR 100 and AMC 600 of the tunneling client in Scenarios 1, 2, and 3.
TABLE VI
made the DNS cache server forward malicious queries gener- PARAMETERS FOR T UNNELING E XPERIMENTS
ated by the tunneling client to the tunneling server. We used
dnscat2 [26] as a DNS tunneling tool for both the tunnel-
ing client and server. Note that because of the nature of
DNS tunneling (i.e., data is exfiltrated via cache misses),
we would have obtained the same results (CHR, AHR,
and AMC) using different tools when the parameters of
the tunneling query transmission interval and the tunnel-
ing traffic generation period were set to the same values.
Before performing the experiments on tunneling, we created a
list of cache entries and access entries by capturing DNS traffic
from 21 clients in our laboratory for 31 days. The parameters
for the experiments are presented in Table VI. We prepared collected from all the clients in Scenarios 1, 2, and 3, for
three data exfiltration scenarios in terms of the tunneling query n = 100 and t = 600 are shown in Fig. 4. Fig. 5 shows
transmission interval: Scenarios 1, 2, and 3, with transmis- the traffic of the tunneling client extracted from Fig. 4. To
sion intervals of 1, 10, and 100 s, respectively. We used a list compute the CHR and AHR of all the clients, a memory to
of cache entries only for Scenario 1, which demonstrated the store the latest n queries was prepared for each client, and the
effectiveness of AHR and AMC against the shortcomings of first CHR and AHR are calculated after the arrival of n queries.
the CHR. We omitted the experiments for Scenarios 2 and 3 To compute the AMC of all the clients, a memory to store the
because the results for Scenario 1 (the “easiest” case for DNS latest queries within t was prepared for each client, and the
tunneling detection) already indicated the shortcomings of the first AMC was calculated after t s. The red curve in Figs. 4
CHR. and 5 indicate that the CHR, AHR, and AMC were affected
by the DNS tunneling traffic generated by the tunneling client.
B. Results These figures illustrate that both the CHR and AHR decreased,
The scatter plot of the time-series data for the CHR collected whereas the AMC increased when DNS tunneling traffic was
from all the clients in Scenario 1, and the AHR and AMC produced.
ISHIKURA et al.: DNS TUNNELING DETECTION BY CACHE-PROPERTY-AWARE FEATURES 1209
Fig. 6. Cumulative distribution functions (CDF) of TTL (s) of unique A and Fig. 7. CDFs of query transmission interval (s) of the tunneling client in
AAAA records in our 31-day dataset. Scenarios 1, 2, and 3, which exclude the tunneling query transmission interval.
TABLE VII
AUC S CORES FOR THE T EST DATASET OF S CENARIOS 1, 2, AND 3
TABLE VIII
AUC S CORES FOR THE T EST DATASET OF S CENARIO 3
TABLE IX
ACCURACY FOR THE T EST DATASET IN S CENARIOS 1, 2, AND 3 (FALSE P OSITIVE R ATE = 0.025)
TABLE X
ACCURACY FOR THE T EST DATASET IN S CENARIO 3 (FALSE P OSITIVE R ATE = 0.025)
TABLE XI
VALUES OF t AND T HRESHOLDS OF THE 9 N ON -D OMINATED S OLUTIONS the operators can determine whether the client is infected by
S ORTED BY T RUE P OSITIVE R ATE (N OTE T HAT THE T HRESHOLD OF THE malware. This strategy to combine these filters is an enterprise
RULE -BASED F ILTER I S AMC W HILE T HAT OF THE LSTM F ILTER I S THE network operation guarding against data exfiltration through
P REDICTION E RROR OF THE C ORRESPONDING AMC-F ORECASTING
LSTM M ODEL ) DNS tunneling.
In this paper, we proposed a method for detecting DNS
tunneling that focuses on DNS clients rather than domain
names. This is because our goal was to prevent information
leakage by detecting DNS clients infected with malware in tar-
geted attacks. As discussed in Section II-C, some researchers
have focused on domain names and proposed filters whose
design guideline was to identify the domain names used to
perform DNS tunneling [11], [14], [18], [20], [21]. The short-
coming of such methods is that they fail when the attackers
and their malware change tactics and utilize several domain
names for the attacks. Our proposed filter does not focus on
once the first alarm goes off, the firewall operator can care- the domain name; rather, it detects attacks based on whether
fully examine the anomalous client and determine whether the access misses have occurred, thereby effectively addressing
client is to be isolated. Finally, the total amount of leaked data the above drawback.
can be reduced as much as possible. Table XI summarizes the The proposed filters can be easily integrated with the con-
values of t and the thresholds of the 9 non-dominated solutions ventional detection methods introduced in Section II-C. For
sorted by true positive rate. example, when malware attempts to leak a file through DNS
tunneling, to detect the attack, a countermeasure adopts length-
based features such as the FQDN length and the longest label
VII. D ISCUSSION length, which are used in the payload analysis. RFC 1035 [53]
Based on the evaluation in the foregoing Section VI, we defines the maximum total length of a domain name (dots
conclude that the rule-based filter achieves a higher rate of included) and a label as 255 characters and 63 characters,
the DNS tunneling attack detection than the LSTM, which, respectively. In the dataset used in [23], more than 99% of
however, detects the attack faster, while both maintain a low the queries included less than 80 characters. Considering the
misdetection rate. From this perspective, enterprise network malware, to improve the information leakage throughput by
operators can deploy our proposed monitoring and filtering adding more data, the FQDN becomes longer. However, this
system with some strategies. For example, first, based on type of malicious FQDN should be filtered out by a counter-
the LSTM filter, the operators identify a suspicious client. measure based on the statistics of the FQDN length. Finally,
After the first alarm raised by the LSTM filter, the operators to circumvent the filter, the malware is forced to generate
still allow the client to produce the queries. However, these more malicious queries, which causes more access misses,
queries, including the tunneling ones, should be resolved by thus including the likelihood of the proposed filter detect-
only the connected DNS cache server without the iterative ing the attack more easily. By combining our proposal with
query process, such that the unresolvable ones do not get for- conventional filters, we can create a more resilient firewall.
warded to the outside (i.e., data exfiltration is eliminated at Our experiments were carried out by utilizing a DNS traf-
this point). Then, using a rule-based filter, at a defined point, fic dataset from 21 clients in our laboratory. We expect that,
ISHIKURA et al.: DNS TUNNELING DETECTION BY CACHE-PROPERTY-AWARE FEATURES 1215
[2] IT Security Risks Survey 2014: A Business Approach to Managing [25] (2011). Morto Worm Sets a (DNS) Record. [Online]. Available:
Data Security Threats. Accessed: Mar. 18, 2021. [Online]. Available: https://community.broadcom.com/symantecenterprise/communities/
https://media.kaspersky.com/en/IT_Security_Risks_Survey_2014_ community-home/librarydocuments/viewdocument?DocumentKey=
Global_report.pdf 268f079a-2bb8-4775-9ef9-1b02e32ca55d&CommunityKey=1ecf5f55-
[3] (2015). Understanding Targeted Attacks: The Impact of Targeted 9545-44d6-b0f4-4e4a7f5f5e68&tab=librarydocuments
Attacks. [Online]. Available: https://www.trendmicro.com/vinfo/us/ [26] dnscat2. Accessed: Mar. 18, 2021. [Online]. Available: https://github.
security/news/cyber-attacks/the-impact-of-targeted-attacks com/iagox86/dnscat2
[4] M. Al-Kasassbeh and T. Khairallah, “Winning tactics with DNS tun- [27] G. K. Zipf, Human Behavior and the Principle of Least Effort.
nelling,” Netw. Security, vol. 2019, no. 12, pp. 12–19, 2019. Cambridge, MA, USA: Addison-Wesley, 1949.
[5] IDC 2020 Global DNS Threat Report. Accessed: Mar. 18, 2021. [28] S. Hochreiter and J. Schmidhuber, “Long short-term memory,” Neural
[Online]. Available: https://www.efficientip.com/resources/idc-dns- Comput., vol. 9, no. 8, pp. 1735–1780, 1997.
threat-report-2020/ [29] T. van Leijenhorst, K.-W. Chin, and D. Lowe, “On the viability and
[6] (2014). New FrameworkPOS Variant Exfiltrates Data via DNS performance of DNS tunneling,” in Proc. 5th Int. Conf. Inf. Technol.
Requests. [Online]. Available: https://www.gdatasoftware.com/blog/ Appl. (ICITA), 2008, pp. 560–566.
2014/10/23942-new-frameworkpos-variant-exfiltrates-data-via-dns- [30] L. Nussbaum, P. Neyron, and O. Richard, “On robust covert channels
requests inside DNS,” in Proc. IFIP Int. Inf. Security Conf. (IFIP SEC), 2009,
pp. 51–62.
[7] (2019). DNS Tunneling in the Wild: Overview of OilRig’s DNS
[31] M. Aiello, A. Merlo, and G. Papaleo, “Performance assessment and anal-
Tunneling. [Online]. Available: https://unit42.paloaltonetworks.com/dns-
ysis of DNS tunneling tools,” Logic J. IGPL, vol. 21, no. 4, pp. 592–602,
tunneling-in-the-wild-overview-of-oilrigs-dns-tunneling/
Aug. 2013.
[8] D. Naylor et al., “Multi-context TLS (McTLS): Enabling secure in- [32] iodine. Accessed: Mar. 18, 2021. [Online]. Available: https://github.com/
network functionality in TLS,” in Proc. ACM Conf. Spec. Interest Group yarrick/iodine
Data Commun. (SIGCOMM), 2015, pp. 199–212. [33] dns2tcp. Accessed: Mar. 18, 2021. [Online]. Available: https://github.
[9] K. Born and D. Gustafson, “Detecting DNS tunnels using charac- com/alex-sector/dns2tcp
ter frequency analysis,” 2010. [Online]. Available: https://arxiv.org/abs/ [34] D. Raman et al., “DNS tunneling for network penetration,” in Proc. Int.
1004.4358. Conf. Inf. Security Cryptol. (ICISC), 2012, pp. 65–77.
[10] W. Ellens, P. Żuraniewski, A. Sperotto, H. Schotanus, M. Mandjes, [35] Backdoor.Win32.Denis. Accessed: Mar. 18, 2021. [Online]. Available:
and E. Meeuwissen, “Flow-based detection of DNS tunnels,” in Proc. https://otx.alienvault.com/pulse/590314fb6575a03746de87a8
IFIP Int. Conf. Auton. Infrastruct. Manage. Security (AIMS), 2013, [36] BernhardPOS. Accessed: Mar. 18, 2021. [Online]. Available: https://otx.
pp. 124–135. alienvault.com/pulse/55a5b4eeb45ff55fb194e69e
[11] V. Paxson et al., “Practical comprehensive bounds on surreptitious [37] Cobalt Strike. Accessed: Mar. 18, 2021. [Online]. Available:
communication over DNS,” in Proc. 22nd USENIX Conf. Security, https://www.cobaltstrike.com/
Aug. 2013, pp. 17–32. [38] DET. Accessed: Mar. 18, 2021. [Online]. Available: https://github.com/
[12] C. Qi, X. Chen, C. Xu, J. Shi, and P. Liu, “A bigram based real time DNS sensepost/DET
tunnel detection approach,” Procedia Comput. Sci., vol. 17, pp. 852–860, [39] DNScat. Accessed: Mar. 18, 2021. [Online]. Available: http://tadek.
2013. pietraszek.org/projects/DNScat/
[13] K. Xu, P. Butler, S. Saha, and D. Yao, “DNS for massive-scale com- [40] DNSExfiltrator. Accessed: Mar. 18, 2021. [Online]. Available:
mand and control,” IEEE Trans. Depend. Secure Comput., vol. 10, no. 3, https://github.com/Arno0x/DNSExfiltrator
pp. 143–153, May/Jun. 2013. [41] (2017). Covert Channels and Poor Decisions: The Tale of
[14] A. M. Kara, H. Binsalleeh, M. Mannan, A. Youssef, and M. Debbabi, DNSMessenger. [Online]. Available: https://blogs.cisco.com/security/
“Detection of malicious payload distribution channels in DNS,” in talos/covert-channels-and-poor-decisions-the-tale-of-dnsmessenger
Proc. IEEE Int. Conf. Commun. (ICC), Sydney, NSW, Australia, 2014, [42] (2018). DNSpionage Campaign Targets Middle East. [Online].
pp. 853–858. Available: https://blog.talosintelligence.com/2018/11/dnspionage-
[15] M. Aiello, M. Mongelli, and G. Papaleo, “DNS tunneling detec- campaign-targets-middle-east.html
tion through statistical fingerprints of protocol messages and machine [43] (2016). Three Month FrameworkPOS Malware Campaign Nabs
learning,” Int. J. Commun. Syst., vol. 28, no. 14, pp. 1987–2002, 2015. ~43,000 Credit Cards From Point of Sale Systems. [Online]. Available:
https://www.anomali.com/blog/three-month-frameworkpos-malware-
[16] M. Aiello, M. Mongelli, E. Cambiaso, and G. Papaleo, “Profiling DNS
campaign-nabs-43000-credits-cards-from-poi
tunneling attacks with PCA and mutual information,” Logic J. IGPL,
vol. 24, no. 6, pp. 957–970, Dec. 2016. [44] (2009). OzymanDNS—Tunneling SSH Over DNS. [Online]. Available:
https://malicious.link/post/2009/2009310ozymandns-tunneling-ssh-over-
[17] A. L. Buczak, P. A. Hanke, G. J. Cancro, M. K. Toma, L. A. Watkins, and dns-html/
J. S. Chavis, “Detection of tunnels in PCAP data by random forests,” in
[45] Reverse DNS Shell. Accessed: Mar. 18, 2021. [Online]. Available:
Proc. 11th Annu. Cyber Inf. Security Res. Conf. (CISRC), 2016, pp. 1–4.
https://github.com/ahhh/Reverse_DNS_Shell
[18] A. Das, M.-Y. Shen, M. Shashanka, and J. Wang, “Detection of exfil- [46] TCP-over-DNS. Accessed: Mar. 18, 2021. [Online]. Available:
tration and tunneling over DNS,” in Proc. 16th IEEE Int. Conf. Mach. https://analogbit.com/software/tcp-over-dns/
Learn. Appl. (ICMLA), Cancun, Mexico, 2017, pp. 737–742. [47] K. Fujiwara, A. Sato, and K. Yoshida, “DNS traffic analysis—CDN and
[19] C.-M. Lai, B.-C. Huang, S.-Y. Huang, C.-H. Mao, and H.-M. Lee, the world IPv6 launch,” J. Inf. Process., vol. 21, no. 3, pp. 517–526,
“Detection of DNS tunneling by feature-free mechanism,” in Proc. 2013.
IEEE Conf. Depend. Secure Comput. (DSC), Kaohsiung, Taiwan, 2018, [48] A. Shaikh, R. Tewari, and M. Agrawal, “On the effectiveness of
pp. 1–2. DNS-based server selection,” in Proc. IEEE INFOCOM Conf. Comput.
[20] J. Steadman and S. Scott-Hayward, “DNSxD: Detecting data exfiltra- Commun. 20th Annu. Joint Conf. IEEE Comput. Commun. Soc., vol. 3.
tion over DNS,” in Proc. IEEE Conf. Netw. Funct. Virtualization Softw. Anchorage, AK, USA, 2001, pp. 1801–1810.
Defined Netw. (NFV-SDN), Verona, Italy, 2018, pp. 1–6. [49] G. C. M. Moura, J. Heidemann, R. D. O. Schmidt, and W. Hardaker,
[21] A. Nadler, A. Aminov, and A. Shabtai, “Detection of malicious and low “Cache me if you can: Effects of DNS time-to-live,” in Proc. ACM
throughput data exfiltration over the DNS protocol,” Comput. Security, Internet Meas. Conf. (IMC), 2019, pp. 101–115.
vol. 80, pp. 36–53, Jan. 2019. [50] K. Hornik, “Approximation capabilities of multilayer feedforward
[22] C. Liu, L. Dai, W. Cui, and T. Lin, “A byte-level CNN method to detect networks,” Neural Netw., vol. 4, no. 2, pp. 251–257, 1991.
DNS tunnels,” in Proc. IEEE 38th Int. Perform. Comput. Commun. Conf. [51] K. Hasegawa, D. Kondo, and H. Tode, “FQDN-based whitelist filter on
(IPCCC), London, U.K., 2019, pp. 1–8. a DNS cache server against the DNS water torture attack,” in Proc.
[23] J. Ahmed, H. H. Gharakheili, Q. Raza, C. Russell, and V. Sivaraman, IFIP/IEEE Int. Symp. Integr. Netw. Manage. (IM), May 2021. [Online].
“Monitoring enterprise DNS queries for detecting data exfiltration from Available: https://im2021.ieee-im.org/program/poster-sessions
internal hosts,” IEEE Trans. Netw. Service Manag., vol. 17, no. 1, [52] D. P. Kingma and J. Ba, “Adam: A method for stochastic optimization,”
pp. 265–279, Mar. 2020. 2014. [Online]. Available: https://arxiv.org/abs/1412.6980.
[24] S. Chen, B. Lang, H. Liu, D. Li, and C. Gao, “DNS covert channel [53] “Domain names—Implementation and specification,” Internet Eng. Task
detection method using the LSTM model,” Comput. Security, vol. 104, Force, RFC 1035, 1987. [Online]. Available: https://tools.ietf.org/html/
May 2021, Art. no. 102095. rfc1035
ISHIKURA et al.: DNS TUNNELING DETECTION BY CACHE-PROPERTY-AWARE FEATURES 1217
Naotake Ishikura received the B.S. and M.S. Iordan Iordanov received the B.S. degree in
degrees in engineering from Osaka Prefecture applied mathematics and the M.S. degree in applied
University, Osaka, Japan, in 2019 and 2021, respec- and computational mathematics from the University
tively. His current research interest includes network of Crete, Greece, in 2013 and 2015, respec-
security. tively, and the Ph.D. degree in computer sci-
ence from the University of Lorraine, LORIA
(CNRS UMR 7503), Inria Nancy-Grand Est, Nancy,
France, in 2019. He is currently a Chief Scientist
with Corpy&Co., Inc., Tokyo, Japan. His research
Daishi Kondo (Member, IEEE) received the B.S. interests include applied and computational math-
degree in engineering from Osaka University, Osaka, ematics, computational geometry, and explainable
Japan, in 2013, the M.A.S. degree in interdis- artificial intelligence.
ciplinary information studies from the University
of Tokyo, Tokyo, Japan, in 2015, and the Ph.D.
degree in computer science from the University
of Lorraine, LORIA (CNRS UMR 7503), Inria
Nancy-Grand Est, Nancy, France, in 2018. He
is currently an Assistant Professor with Osaka
Prefecture University. His research interests include
information-centric networking, network security,
privacy, and peer-to-peer networking.
Vassilis Vassiliades received the B.Sc. degree in Hideki Tode (Member, IEEE) received the B.E.,
computer science from the University of Cyprus M.E., and Ph.D. degrees in communications engi-
(UCY) in 2007, the M.Sc. degree in intelli- neering from Osaka University in 1988, 1990,
gent systems engineering from the University of and 1997, respectively. From 1991 to 2008, he
Birmingham, U.K., in 2008, and the Ph.D. degree was an Assistant Professor and an Associate
in computer science from UCY in 2015. He is Professor with Osaka University. He has been
currently a Team Leader with the CYENS Centre a Professor with the Department of Computer
of Excellence (formerly known as RISE), Cyprus, Science and Intelligent Systems, Graduate School
and an Associate Research Fellow with UCY. He of Engineering, Osaka Prefecture University since
was a Postdoctoral Fellow and a Research Engineer 2008. His current research interests include archi-
with Inria Nancy, France, from 2015 to 2018 and a tectures and controls for optical networks, wireless
Research Associate with UCY from 2015 to 2019 and RISE in 2019. His multihop networks, future Internet, and content distribution networks. He
research interests lie in the areas of artificial intelligence and robotics, with is a Fellow of the Institute of Electronics Information and Communication
emphasis on machine learning and evolutionary computation. Engineers, Japan.