DomEye: Detecting network covert channel of domain fronting with throughput fluctuation

IF 4.8 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Computers & Security Pub Date : 2024-07-04 DOI:10.1016/j.cose.2024.103976
Yibo Xie, Gaopeng Gou, Gang Xiong, Zhen Li, Wei Xia
{"title":"DomEye: Detecting network covert channel of domain fronting with throughput fluctuation","authors":"Yibo Xie,&nbsp;Gaopeng Gou,&nbsp;Gang Xiong,&nbsp;Zhen Li,&nbsp;Wei Xia","doi":"10.1016/j.cose.2024.103976","DOIUrl":null,"url":null,"abstract":"<div><p>Domain fronting, a typical network covert channel, hides malicious information inside encrypted network connections, which are usually established with cloud-hosted domain names. Due to these domain names such as <em>microsoft.com</em> with high reputation, domain fronting realizes the imitation of normal network connections naturally. At present, the common way for domain fronting detection is using imitation flaws to distinguish it from normal network connections. Unlike existing approaches using packet-level flaws, in the paper, we propose DomEye, a novel method using flow-level flaws to detect domain fronting. The DomEye detector exploits a flow-level imitation flaw that domain fronting connections usually exhibit different throughput than normal connections, for example, <em>meek</em>, a domain fronting-based tool for covert darknet access, only reaches a throughput about 10.7 KB at the 50th packet, significantly less than file, image and other normal network requests. According to the imitation flaw, we extract statistical features of throughput fluctuation and feed them into machine learning algorithms to train DomEye detector. Experiments on real-world network traffic prove that DomEye can accurately identify three kinds of domain fronting-based tools with lower false positive rate and lesser computation overhead than the state-of-the-art methods. In conclusion, we propose a superior method for domain fronting detection based on the throughput imitation flaw. As this flaw is at the flow level, we hope more attention could be paid to mining flow-level flaws in the future.</p></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":null,"pages":null},"PeriodicalIF":4.8000,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404824002815","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Domain fronting, a typical network covert channel, hides malicious information inside encrypted network connections, which are usually established with cloud-hosted domain names. Due to these domain names such as microsoft.com with high reputation, domain fronting realizes the imitation of normal network connections naturally. At present, the common way for domain fronting detection is using imitation flaws to distinguish it from normal network connections. Unlike existing approaches using packet-level flaws, in the paper, we propose DomEye, a novel method using flow-level flaws to detect domain fronting. The DomEye detector exploits a flow-level imitation flaw that domain fronting connections usually exhibit different throughput than normal connections, for example, meek, a domain fronting-based tool for covert darknet access, only reaches a throughput about 10.7 KB at the 50th packet, significantly less than file, image and other normal network requests. According to the imitation flaw, we extract statistical features of throughput fluctuation and feed them into machine learning algorithms to train DomEye detector. Experiments on real-world network traffic prove that DomEye can accurately identify three kinds of domain fronting-based tools with lower false positive rate and lesser computation overhead than the state-of-the-art methods. In conclusion, we propose a superior method for domain fronting detection based on the throughput imitation flaw. As this flaw is at the flow level, we hope more attention could be paid to mining flow-level flaws in the future.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
DomEye:检测吞吐量波动的域前沿网络隐蔽信道
域名掩护是一种典型的网络隐蔽渠道,它将恶意信息隐藏在加密的网络连接中,而这些网络连接通常是通过云托管的域名建立的。由于这些域名如 microsoft.com 等具有很高的知名度,域名前置自然而然地实现了对正常网络连接的模仿。目前,域名前置检测的常用方法是利用仿冒缺陷将其与正常网络连接区分开来。与现有的利用数据包级缺陷的方法不同,本文提出了一种利用流量级缺陷检测域前置的新方法--DomEye。DomEye 检测器利用了流量级模仿缺陷,即域前置连接通常表现出与正常连接不同的吞吐量,例如,基于域前置的隐蔽暗网访问工具 meek 在第 50 个数据包时的吞吐量仅为 10.7 KB 左右,明显低于文件、图像和其他正常网络请求。根据模仿缺陷,我们提取了吞吐量波动的统计特征,并将其输入机器学习算法来训练 DomEye 检测器。真实网络流量实验证明,DomEye 能准确识别三种基于域前置的工具,而且误报率较低,计算开销也低于最先进的方法。总之,我们提出了一种基于吞吐量模仿缺陷的卓越的域前置检测方法。由于这种缺陷是流量级的,我们希望今后能更多地关注流量级缺陷的挖掘。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Computers & Security
Computers & Security 工程技术-计算机:信息系统
CiteScore
12.40
自引率
7.10%
发文量
365
审稿时长
10.7 months
期刊介绍: Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world. Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.
期刊最新文献
A survey on privacy and security issues in IoT-based environments: Technologies, protection measures and future directions Practically implementing an LLM-supported collaborative vulnerability remediation process: A team-based approach An enhanced Deep-Learning empowered Threat-Hunting Framework for software-defined Internet of Things Editorial Board ReckDroid: Detecting red packet fraud in Android apps
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1