{"title":"Mobile cyber defense agents for low throughput DNS-based data exfiltration detection in military networks","authors":"T. Aurisch, Paula Caballero Chacón, Andreas Jacke","doi":"10.1109/ICMCIS52405.2021.9486400","DOIUrl":null,"url":null,"abstract":"DNS is a widely adopted protocol for the translation between domain names and IP addresses. Due to its lack of built-in security mechanisms attackers often use DNS for attacks like tunneling and data exfiltration. Solutions for centralized and static networks exist but fail to work efficiently in tactical networks. In this paper, we combine the concept of mobile agents with modern analysis techniques like machine learning to develop a detection system for DNS-based attacks in military networks. The proposed system is evaluated regarding its efficiency.","PeriodicalId":246290,"journal":{"name":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","volume":"178 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Military Communication and Information Systems (ICMCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMCIS52405.2021.9486400","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
DNS is a widely adopted protocol for the translation between domain names and IP addresses. Due to its lack of built-in security mechanisms attackers often use DNS for attacks like tunneling and data exfiltration. Solutions for centralized and static networks exist but fail to work efficiently in tactical networks. In this paper, we combine the concept of mobile agents with modern analysis techniques like machine learning to develop a detection system for DNS-based attacks in military networks. The proposed system is evaluated regarding its efficiency.