Javascript must be enabled to continue!
Leveraging Tabular Transformers for AdvancedDetection of Data Exfiltration in DNS Traffic
View through CrossRef
Abstract
Recent advancements in DNS protocols like DNS over HTTPS (DoH), DNS over TLS (DoT), and DNS over QUIC (DoQ) have enabled secure communications for enterprise networks through encrypted connections. While DoH supports secure communication on multiple platforms, malicious implementations can pose significant security risks, including evasion of monitoring, malware communication, and data exfiltration. This study aims to address the security challenges posed by malicious implementations of DNS over HTTPS (DoH) by developing a robust classification model that can differentiate between benign and malicious DoH traffic. We propose a novel model based on the TabTransformer architecture, utilizing self-attention mechanisms. This model transforms network capture features into latent representations, allowing for the effective categorization of DoH traffic. The model is specifically designed to enhance the detection of DNS data exfiltration attacks, particularly those arising from misconfigurations in DNS servers. The performance of the proposed TabTransformer-based attention model is evaluated using the BCCC-CIC-Bell-DNS-2024 dataset. Results demonstrate a significant improvement in the accuracy of classifying DoH traffic as malicious or benign, highlighting the efficacy of embedding generation and attention techniques in enhancing detection capabilities. Our findings show that using the TabTransformer model can significantly improve the monitoring and classification of malicious DoH traffic, reducing security threats in enterprise networks.
Title: Leveraging Tabular Transformers for AdvancedDetection of Data Exfiltration in DNS Traffic
Description:
Abstract
Recent advancements in DNS protocols like DNS over HTTPS (DoH), DNS over TLS (DoT), and DNS over QUIC (DoQ) have enabled secure communications for enterprise networks through encrypted connections.
While DoH supports secure communication on multiple platforms, malicious implementations can pose significant security risks, including evasion of monitoring, malware communication, and data exfiltration.
This study aims to address the security challenges posed by malicious implementations of DNS over HTTPS (DoH) by developing a robust classification model that can differentiate between benign and malicious DoH traffic.
We propose a novel model based on the TabTransformer architecture, utilizing self-attention mechanisms.
This model transforms network capture features into latent representations, allowing for the effective categorization of DoH traffic.
The model is specifically designed to enhance the detection of DNS data exfiltration attacks, particularly those arising from misconfigurations in DNS servers.
The performance of the proposed TabTransformer-based attention model is evaluated using the BCCC-CIC-Bell-DNS-2024 dataset.
Results demonstrate a significant improvement in the accuracy of classifying DoH traffic as malicious or benign, highlighting the efficacy of embedding generation and attention techniques in enhancing detection capabilities.
Our findings show that using the TabTransformer model can significantly improve the monitoring and classification of malicious DoH traffic, reducing security threats in enterprise networks.
Related Results
Traffic Prediction in 5G Networks Using Machine Learning
Traffic Prediction in 5G Networks Using Machine Learning
The advent of 5G technology promises a paradigm shift in the realm of
telecommunications, offering unprecedented speeds and connectivity. However, the
...
TYPES OF AI ALGORİTHMS USED İN TRAFFİC FLOW PREDİCTİON
TYPES OF AI ALGORİTHMS USED İN TRAFFİC FLOW PREDİCTİON
The increasing complexity of urban transportation systems and the growing volume of vehicles have made traffic congestion a persistent challenge in modern cities. Efficient traffic...
CG-TGAN: Conditional Generative Adversarial Networks with Graph Neural Networks for Tabular Data Synthesizing
CG-TGAN: Conditional Generative Adversarial Networks with Graph Neural Networks for Tabular Data Synthesizing
Data sharing is necessary for AI to be widely used, but sharing sensitive data with others with privacy is risky.
To solve these problems, it is necessary to synthesize realistic t...
Associations of digital neuro-signatures with molecular and neuroimaging measures of brain resilience: The altoida large cohort study
Associations of digital neuro-signatures with molecular and neuroimaging measures of brain resilience: The altoida large cohort study
BackgroundMixed results in the predictive ability of traditional biomarkers to determine cognitive functioning and changes in older adults have led to misdiagnosis and inappropriat...
On the Remote Calibration of Instrumentation Transformers: Influence of Temperature
On the Remote Calibration of Instrumentation Transformers: Influence of Temperature
The remote calibration of instrumentation transformers is theoretically possible using synchronous measurements across a transmission line with a known impedance and a local set of...
MODELİNG OF TRAFFİC LİGHT CONTROL SYSTEMS
MODELİNG OF TRAFFİC LİGHT CONTROL SYSTEMS
Traffic light control systems are commonly utilized to monitor and manage the flow of autos across multiple road intersections. Since traffic jams are ubiquitous in daily life, A c...
Direct numerical simulations of turbulence subjected to a straining and destraining cycle
Direct numerical simulations of turbulence subjected to a straining and destraining cycle
In many turbulent flows, significant interactions between fluctuations and mean velocity gradients occur in nonequilibrium conditions, i.e., the turbulence does not have sufficient...
Definition of delayed-onset neurologic sequelae: A review article
Definition of delayed-onset neurologic sequelae: A review article
ABSTRACT
Dakessian A, Hagen Z, Rocksmith ER, Sethuraman KN. Definition of delayed-onset neurologic sequelae: A review article. Undersea Hyperb Med. 2025 Second Quarter; 52(2):121-1...

