classified into legitimate with review and cross
reference check that include many anti-virus
companies or CDN vendors. A tunnel with
significant payloads in query or response only is
categorized into outbound or inbound tunnel and
otherwise two-way tunnel. As illustrated in Figure 7,
majority falls into one-way tunnel and malicious
tunnels have a higher outbound to inbound ratio than
legitimate ones due to their data exfiltration nature.
Table 1: Detected tunnels.
Malicious Legitimate All
Two-way 356 869 1225
Outbound 35478 65820 101298
Inbound 2845 20504 23349
Total 38678 87193 125871
Figure 7: Tunnel distribution.
We also analysed the tunnel transaction activity
distribution over DNS query type and the result is
plotted in Figure 8, where a tunnel transition is
simply a DNS message. It shows malicious activities
tend to use type A while legitimate ones have higher
transaction rate on type TXT. This is understandable
that malicious tunnels want to hide their activities
from using TXT type that is designated for large
payload transactions and may be exanimated by
many traditional DNS tunnelling detection methods.
Figure 8: Tunnel transaction activities by DNS query type.
New data shows more and more malicious
tunnels are using small payloads. This makes
detection even harder and will be a future research
work.
REFERENCES
Iodine, http://code.kryo.se/iodine/.
Farnham, G., Atlasis, A., 2013. Detecting DNS tunneling,
SANS Institute InfoSec Reading Room.
Wong, M., 2006. Sender policy framework (SPF) for
authorizing use of domains in e-mail, version 1,
Retrieved from http://tools.ietf.org/html/rfc4408.
Yu, B., Smith, L., Threefoot, M., 2014. Semi-supervised
time series modeling for real-time flux domain
detection on passive DNS traffic, in the 10
th
International Conference on Data Mining and Machine
Learning, St. Petersburg, Russia, pp. 258-271.
Vixie, P., 1999. Extension mechanisms for DNS (EDNS0),
Retrieved from http://www.ietf.org/rfc/rfc2 671.txt.
Borders, K., Prakash, A., 2004. Web Tap: detecting covert
web traffic, in Proceedings of the 11
th
ACM
conference on Conputer and Communications
Security, New York, pp. 110-120.
Crotti, M., Dusi, M., Gringoli, F., Salgarelli, L., 2007.
Detecting HTTP tunnels with statistical mechanisms,
in IEEE International Conference on
Communications, pp. 6162-6168.
Crotti, M., Dusi, M., Gringoli, F., Salgarelli, L., 2008.
Detection of encrypted tunnels across network
boundaries, in Proceedings of the 43
rd
IEEE
International Conference on Communications, Beijing
China, pp. 19-23.
Dusi, M., Gringoli, F., Salgarelli, L., 2008. A preliminary
look at the privacy of SSH tunnels, in Proceedings of
the 17
th
IEEE International Conference on Computer
Communications and Networks, St. Thomas, U.S.
Virgin Islands.
Hind, J., 2009. Catching DNS tunnels with AI, in
Proceedings of DefCon 17, Las Vegas, Nevada.
Born, K., Gustafson, D., 2010. Detecting DNS tunnels
using character frequency analysis, in Proceedings of
the 9
th
Annual Security Conference, Las Vegas, NV.
Ellens, W., Zuraniewski, P., Sperotto, A., Schotanus, H.,
Mandjes, M., Meeuwissen, E., 2013. Flow-based
detection of DNS tunnels, in Emerging Management
Mechanisms for the Future Internet, Lecture Notes in
Computer Science, Volume 7943, pp 124-135.
ISC, ISC Security Information Exchange: http://www.isc.
org/
Farsight, Farsight Security, Inc.: https://www.farsightsecu
rity.com/
Shannon, C., 1948. A Mathematical Theory of
Communication, Bell System Technical Journal, Vol.
27, pp. 379–423, 623–656.
Google, http://storage.googleapis.com/books/ngrams/book
s/datasetsv2.html.
0 K
20 K
40 K
60 K
80 K
Two-way Outbound Inbound
Malicious Legitimate
0 M
50 M
100 M
150 M
200 M
Malicious Legitimate