University of Bahrain
Scientific Journals

Malicious traffic Detection of DNS over HTTPS using Ensemble Machine Learning

Show simple item record

dc.contributor.author Singh, Sunil Kumar
dc.contributor.author Roy, Pradeep Kumar
dc.date.accessioned 2022-02-12T01:09:09Z
dc.date.available 2022-02-12T01:09:09Z
dc.date.issued 2022-02-15
dc.identifier.issn 2210-142X
dc.identifier.uri https://journal.uob.edu.bh:443/handle/123456789/4585
dc.description.abstract As the Internet is growing very fast, the Domain Name System remains under constant attacks and day by day its vulnerability is increasing. In the cyberattacks, it has been shown that the maximum attackers make target on Domain Name System. Several security add-ons came with DNS to secure it, but we have not come across any robust solution until now. DNS over HTTPS and DNS over TLS are introduced recently with encrypted DNS to reduce the visibility of DNS requests. DNS over HTTPS has been designed to mitigate the DNS security issues but it has own drawbacks like it bypasses the local firewalls. However, DNS over HTTPS is a popular protocol now, but it is also vulnerable. This paper presents a Machine Learning approach to detect. DNS over HTTPS traffic and to filter it into Benign-DNS over HTTPS traffic and Malicious-DNS over HTTPS traffic using ensemble machine learning algorithms. To find the best prediction results, we have applied various ML models such as; (i) Decision tree, ii) Logistic regression, (iii) K nearest neighboring, and (iv) Random forest. Several evaluation matrices have been considered to analyze the performance, like precision, recall, F1-score, and confusion matrix. The results analysis is carried out on a benchmark DNS over HTTPS dataset (CIRA-CIC-DoHBrw-2020) with 30 extracted features. To make this model robust, several parameters are used to check its performance. An ensemble learning-based RF classifier emerge as the best-suited model with 100% accuracy. The outcomes of the proposed ensemble learning model confirmed that it is the best choice to secure the DNS over HTTPS based DNS attacks because this model detected most malicious activities. en_US
dc.language.iso en en_US
dc.publisher University Of Bahrain en_US
dc.subject Domain Name System en_US
dc.subject DNS en_US
dc.subject DNS-over-HTTPS en_US
dc.subject DoH, Machine Learning en_US
dc.subject DNS encryption en_US
dc.subject DNS Security en_US
dc.subject Ensemble learning en_US
dc.title Malicious traffic Detection of DNS over HTTPS using Ensemble Machine Learning en_US
dc.identifier.doi https://dx.doi.org/10.12785/ijcds/110185
dc.volume 11 en_US
dc.issue 1 en_US
dc.pagestart 189 en_US
dc.pageend 197 en_US
dc.contributor.authorcountry India en_US
dc.contributor.authoraffiliation School of Computer Science and Engineering, VIT-AP University, Near Vijayawada en_US
dc.contributor.authoraffiliation Department of Computer Science and Engineering, Indian Institute of Information Technology Surat en_US
dc.source.title International Journal of Computing and Digital Systems en_US
dc.abbreviatedsourcetitle IJCDS en_US


Files in this item

This item appears in the following Issue(s)

Show simple item record

All Journals


Advanced Search

Browse

Administrator Account