skip to main content
10.1145/1852666.1852718acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

NgViz: detecting DNS tunnels through n-gram visualization and quantitative analysis

Published: 21 April 2010 Publication History

Abstract

This paper introduced NgViz, a tool that examines DNS traffic and shows anomalies in n-gram frequencies. This is accomplished by comparing input files against a fingerprint of legitimate traffic. Both quantitative analysis and visual aids are provided that allow the user to make determinations about the legitimacy of the DNS traffic.

Supplementary Material

Supplemental material. (a47-born_slides.pdf)

References

[1]
Borders, K. and Prakash, A. 2004. Web tap: detecting covert web traffic. In CCS'04: Proceedings of the 11th ACM conference on Computer and Communications Security, New York, NY, ACM Press, 110--120.
[2]
Born, K. and Gustafson, D. 2010. Detecting DNS Tunnels Using Character Frequency Analysis. In Proceedings of the 9th Annual Security Conference, April 7--8, Las Vegas, Nevada.
[3]
Crotti, M., Dusi, M., Gringoli, F., Salgarelli, L. 2007. Detecting HTTP Tunnels with Statistical Mechanisms. IEEE International Conference on Communications (ICC) '07, 6162--6168.
[4]
Crotti, M., Dusi, M., Gringoli, F., Salgarelli, L. 2008. Detection of Encrypted Tunnels Across Network Boundaries. In Proceedings of the 43rd IEEE International Conference on Communications (ICC 2008), May 19--23, Beijing, China.
[5]
Dembour, O. Dns2tcp. http://www.hsc.fr/ressources/outils/dns2tcp/index.html.en, Nov 2008.
[6]
Dusi, M., Gringoli, F., Salgarelli, L. 2008. A Preliminary Look at the Privacy of SSH Tunnels. In Proceedings of the 17th IEEE International Conference on Computer Communications and Networks (ICCN 2008), St. Thomas, U.S. Virgin Islands.
[7]
Hind, Jarod. 2009. Catching DNS Tunnels with A.I. In Proceedings of DefCon 17, July 29--Aug 2, Las Vegas, Nevada.
[8]
Iodine. http://code.kryo.se/iodine/, June 2009.
[9]
Plonka, D., and Barford, P. 2008. Context-aware Clustering of DNS Query Traffic. In Proceedings of the 8th ACM SIGCOMM Internet Measurement Conference (IMC'08), Oct 20--22, Vouliagmeni, Greece.
[10]
Pcap. 2010. http://en.wikipedia.org/wiki/Pcap.
[11]
Ren, P., Kristoff, J., Gooch, B. 2006. Visualizing DNS Traffic. In Proceedings of the 3rd International Workshop on Visualization for Computer Security, Oct 30--Nov 3, Alexendria, VA.
[12]
Shannon, C. 1951. Prediction and Entropy of Printed English. The Bell Systems Technical Journal, 30:50--64
[13]
TCP-over-DNS tunnel software HOWTO. http://analogbit.com/tcp-over-dns_howto, July 2008
[14]
Top Sites. http://www.alexa.com/topsites, Nov 2009.
[15]
Zipf, G. 1932. Selective Studies and the Principle of Relative Frequency in Language, Cambridge, Ma.

Cited By

View all
  • (2024)Health Care DNS Tunnelling Detection Method via Spiking Neural NetworkEmergent Converging Technologies and Biomedical Systems10.1007/978-981-99-8646-0_56(715-725)Online publication date: 25-Feb-2024
  • (2023)Attention-based Mechanism for Anomaly Time Slice Detection in DNS Tunnel Communication2023 IEEE 5th International Conference on Civil Aviation Safety and Information Technology (ICCASIT)10.1109/ICCASIT58768.2023.10351659(767-771)Online publication date: 11-Oct-2023
  • (2023)OptiTuneD: An Optimized Framework for Zero-Day DNS Tunnel Detection Using N-Grams2023 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)10.1109/ANTS59832.2023.10469430(177-182)Online publication date: 17-Dec-2023
  • Show More Cited By

Index Terms

  1. NgViz: detecting DNS tunnels through n-gram visualization and quantitative analysis

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CSIIRW '10: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
    April 2010
    257 pages
    ISBN:9781450300179
    DOI:10.1145/1852666
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 21 April 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. DNS
    2. anomaly detection
    3. character frequency analysis
    4. network traffic analysis
    5. tunnel detection
    6. visualization

    Qualifiers

    • Research-article

    Conference

    CSIIRW '10

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)6
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Health Care DNS Tunnelling Detection Method via Spiking Neural NetworkEmergent Converging Technologies and Biomedical Systems10.1007/978-981-99-8646-0_56(715-725)Online publication date: 25-Feb-2024
    • (2023)Attention-based Mechanism for Anomaly Time Slice Detection in DNS Tunnel Communication2023 IEEE 5th International Conference on Civil Aviation Safety and Information Technology (ICCASIT)10.1109/ICCASIT58768.2023.10351659(767-771)Online publication date: 11-Oct-2023
    • (2023)OptiTuneD: An Optimized Framework for Zero-Day DNS Tunnel Detection Using N-Grams2023 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS)10.1109/ANTS59832.2023.10469430(177-182)Online publication date: 17-Dec-2023
    • (2022)DNS-tunneling-detection Method by Monitoring DNS Subdomain Length for General Usage2022 IEEE 11th Global Conference on Consumer Electronics (GCCE)10.1109/GCCE56475.2022.10014255(121-122)Online publication date: 18-Oct-2022
    • (2022)A comprehensive survey on DNS tunnel detectionComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2021.108322197:COnline publication date: 9-Apr-2022
    • (2022)A Two-Stage Method for Fine-Grained DNS Covert Tunnel Behavior DetectionScience of Cyber Security10.1007/978-3-031-17551-0_13(201-216)Online publication date: 30-Sep-2022
    • (2021)Application Behavior Identification in DNS Tunnels Based on Spatial-Temporal InformationIEEE Access10.1109/ACCESS.2021.30855009(80639-80653)Online publication date: 2021
    • (2020)Monitoring Enterprise DNS Queries for Detecting Data Exfiltration From Internal HostsIEEE Transactions on Network and Service Management10.1109/TNSM.2019.294073517:1(265-279)Online publication date: Mar-2020
    • (2020)TDAE: Autoencoder-based Automatic Feature Learning Method for the Detection of DNS tunnelICC 2020 - 2020 IEEE International Conference on Communications (ICC)10.1109/ICC40277.2020.9149162(1-7)Online publication date: Jun-2020
    • (2019)DGA and DNS Covert Channel Detection System based on Machine LearningProceedings of the 3rd International Conference on Computer Science and Application Engineering10.1145/3331453.3361663(1-5)Online publication date: 22-Oct-2019
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media