DNS Tunneling: Threat Landscape and Improved Detection Solutions
Amirov, Novruz, Isik, Baran, Tuncer, Bilal Ihsan, Bahtiyar, Serif
–arXiv.org Artificial Intelligence
--Detecting DNS tunneling is a significant challenge in cybersecurity due to its capacity to hide harmful actions within DNS traffic that appears to be normal and legitimate. Traditional detection methods based on rule-based approaches or signature matching are often insufficient to accurately identify such covert communication channels. This paper addresses the necessity of machine learning methods for effective DNS tunneling detection. We propose a novel approach to detect DNS tunneling. Through the combination of advanced machine learning algorithms and the analysis of various features extracted from DNS traffic, our aim is to provide an accurate DNS tunneling detection model. A. About the Subject The Domain Name System (DNS) is a hierarchical and decentralized naming system crucial for internet functionality [1]. As a core component of internet infrastructure, DNS is used in nearly every online transaction, making it a prime target for a variety of cyber threats. Due to its foundational role and widespread trust, DNS is vulnerable to several types of attacks, threat landscape can be seen in [2], such as cache poisoning, amplification and DoS attacks, and phishing attacks. These vulnerabilities offer attackers multiple possibilities to disrupt or manipulate internet traffic.
arXiv.org Artificial Intelligence
Jul-15-2025
- Country:
- Asia
- China > Liaoning Province
- Shenyang (0.04)
- Middle East > Republic of Türkiye
- Istanbul Province > Istanbul (0.04)
- China > Liaoning Province
- Europe
- France > Brittany
- Ille-et-Vilaine > Rennes (0.04)
- Middle East > Republic of Türkiye
- Istanbul Province > Istanbul (0.04)
- France > Brittany
- Oceania > Palau (0.04)
- Asia
- Genre:
- Research Report > Promising Solution (0.34)
- Industry:
- Government > Military
- Cyberwarfare (0.68)
- Information Technology > Security & Privacy (1.00)
- Government > Military
- Technology: