DNS-IDS: Securing DNS in the Cloud Era

Pratik Satam, Hamid Alipour, Youssif Al-Nashif, Salim Hariri

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Abstract

Recently, there has been a rapid growth in cloud computing due to their ability to offer computing and storage on demand, its elasticity, and significant reduction in operational costs. However, cloud security is a grand obstacle for full deployment and utilization of cloud services. In this paper, we address the security of the DNS protocol that is widely used to translate the cloud domain names to correct IP addresses. The DNS protocol is prone to attacks like cache poisoning attacks and DNS hijacking attacks that can lead to compromising user's cloud accounts and stored information. We present an anomaly based Intrusion Detection System (IDS) for the DNS protocol (DNS-IDS) that models the normal operations of the DNS protocol and accurately detects any abnormal behavior or exploitation of the protocol. The DNS-IDS system operates in two phases, the training phase and the operational phase. In the training phase, we model the normal behavior of the DNS protocol as a finite state machine and we derive the normal temporal statistics of how normal DNS traffic transition within that state machine and store them in a database. To bound the normal event space, we also apply few known DNS attacks (e.g. Cache poisoning) and store the temporal statistics of the abnormal DNS traffic transition in a separate database. Then we develop an anomaly metric for the DNS protocol that is a function of the temporal statistics for both the normal and abnormal transitions of the DNS by applying classification algorithms like the Bagging algorithm. During the operational phase, the anomaly metric is used to detect DNS attacks (both known and novel attacks). We have evaluated our approach against a wide range of DNS attacks (DNS hijacking, Kaminsky attack, amplification attack, Birthday attack, DNS Rebinding attack). Our results show attack detection rate of 97% with very low false positive alarm rate (0.01397%), and round 3% false negatives.

Original languageEnglish (US)
Title of host publicationProceedings - 2015 International Conference on Cloud and Autonomic Computing, ICCAC 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages296-301
Number of pages6
ISBN (Electronic)0769556361, 9781467395663
DOIs
StatePublished - Oct 28 2015
EventInternational Conference on Cloud and Autonomic Computing, ICCAC 2015 - Boston, United States
Duration: Sep 21 2015Sep 25 2015

Publication series

NameProceedings - 2015 International Conference on Cloud and Autonomic Computing, ICCAC 2015

Other

OtherInternational Conference on Cloud and Autonomic Computing, ICCAC 2015
Country/TerritoryUnited States
CityBoston
Period9/21/159/25/15

Keywords

  • Anomaly detection
  • DNS
  • Data mining
  • Intrusion detection system
  • Machine learning
  • Supervised training

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'DNS-IDS: Securing DNS in the Cloud Era'. Together they form a unique fingerprint.

Cite this