skip to main content
10.1145/1852666.1852718acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

NgViz: detecting DNS tunnels through n-gram visualization and quantitative analysis

Published:21 April 2010Publication History

ABSTRACT

This paper introduced NgViz, a tool that examines DNS traffic and shows anomalies in n-gram frequencies. This is accomplished by comparing input files against a fingerprint of legitimate traffic. Both quantitative analysis and visual aids are provided that allow the user to make determinations about the legitimacy of the DNS traffic.

Skip Supplemental Material Section

Supplemental Material

References

  1. Borders, K. and Prakash, A. 2004. Web tap: detecting covert web traffic. In CCS'04: Proceedings of the 11th ACM conference on Computer and Communications Security, New York, NY, ACM Press, 110--120. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Born, K. and Gustafson, D. 2010. Detecting DNS Tunnels Using Character Frequency Analysis. In Proceedings of the 9th Annual Security Conference, April 7--8, Las Vegas, Nevada.Google ScholarGoogle Scholar
  3. Crotti, M., Dusi, M., Gringoli, F., Salgarelli, L. 2007. Detecting HTTP Tunnels with Statistical Mechanisms. IEEE International Conference on Communications (ICC) '07, 6162--6168.Google ScholarGoogle Scholar
  4. Crotti, M., Dusi, M., Gringoli, F., Salgarelli, L. 2008. Detection of Encrypted Tunnels Across Network Boundaries. In Proceedings of the 43rd IEEE International Conference on Communications (ICC 2008), May 19--23, Beijing, China.Google ScholarGoogle Scholar
  5. Dembour, O. Dns2tcp. http://www.hsc.fr/ressources/outils/dns2tcp/index.html.en, Nov 2008.Google ScholarGoogle Scholar
  6. Dusi, M., Gringoli, F., Salgarelli, L. 2008. A Preliminary Look at the Privacy of SSH Tunnels. In Proceedings of the 17th IEEE International Conference on Computer Communications and Networks (ICCN 2008), St. Thomas, U.S. Virgin Islands.Google ScholarGoogle ScholarCross RefCross Ref
  7. Hind, Jarod. 2009. Catching DNS Tunnels with A.I. In Proceedings of DefCon 17, July 29--Aug 2, Las Vegas, Nevada.Google ScholarGoogle Scholar
  8. Iodine. http://code.kryo.se/iodine/, June 2009.Google ScholarGoogle Scholar
  9. Plonka, D., and Barford, P. 2008. Context-aware Clustering of DNS Query Traffic. In Proceedings of the 8th ACM SIGCOMM Internet Measurement Conference (IMC'08), Oct 20--22, Vouliagmeni, Greece. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Pcap. 2010. http://en.wikipedia.org/wiki/Pcap.Google ScholarGoogle Scholar
  11. Ren, P., Kristoff, J., Gooch, B. 2006. Visualizing DNS Traffic. In Proceedings of the 3rd International Workshop on Visualization for Computer Security, Oct 30--Nov 3, Alexendria, VA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Shannon, C. 1951. Prediction and Entropy of Printed English. The Bell Systems Technical Journal, 30:50--64Google ScholarGoogle ScholarCross RefCross Ref
  13. TCP-over-DNS tunnel software HOWTO. http://analogbit.com/tcp-over-dns_howto, July 2008Google ScholarGoogle Scholar
  14. Top Sites. http://www.alexa.com/topsites, Nov 2009.Google ScholarGoogle Scholar
  15. Zipf, G. 1932. Selective Studies and the Principle of Relative Frequency in Language, Cambridge, Ma.Google ScholarGoogle Scholar

Index Terms

  1. NgViz: detecting DNS tunnels through n-gram visualization and quantitative analysis

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CSIIRW '10: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
      April 2010
      257 pages
      ISBN:9781450300179
      DOI:10.1145/1852666

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 21 April 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader