论文标题

DNS加密的调查:当前开发,恶意软件滥用和推理技术

A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference Techniques

论文作者

Lyu, Minzhao, Gharakheili, Hassan Habibi, Sivaraman, Vijay

论文摘要

将字母名称映射到数字Internet协议(IP)的域名系统(DNS)地址为Internet Communications的基础角色。默认情况下,DNS查询和响应以未加密的明文交换,因此可以被第三方读取和/或劫持。为了保护用户隐私,网络社区提出了标准加密技术,例如TLS(DOT)的DNS,HTTPS(DOH)上的DNS(DNS)和DNS上的DNS(DOQ),以进行DNS通信,使客户能够执行安全和私人域名查找。我们调查了自2016年以来发表的DNS加密文献,重点介绍其当前的景观以及如何被恶意软件滥用,并强调了从加密DNS流量中推断出的现有技术。首先,我们概述了在DNS加密空间中制定的各种标准及其采用状况,绩效,福利和安全问题。其次,我们重点介绍了各种恶意软件家族可以利用DNS加密来利用僵尸网络通信和/或数据剥落的方式。第三,我们讨论了现有的推理方法,用于分析正常模式和/或检测恶意加密的DNS流量。提出了几个方向,以激发未来的研究,以增强DNS加密的性能和安全性。

The domain name system (DNS) that maps alphabetic names to numeric Internet Protocol (IP) addresses plays a foundational role for Internet communications. By default, DNS queries and responses are exchanged in unencrypted plaintext, and hence, can be read and/or hijacked by third parties. To protect user privacy, the networking community has proposed standard encryption technologies such as DNS over TLS (DoT), DNS over HTTPS (DoH), and DNS over QUIC (DoQ) for DNS communications, enabling clients to perform secure and private domain name lookups. We survey the DNS encryption literature published since 2016, focusing on its current landscape and how it is misused by malware, and highlighting the existing techniques developed to make inferences from encrypted DNS traffic. First, we provide an overview of various standards developed in the space of DNS encryption and their adoption status, performance, benefits, and security issues. Second, we highlight ways that various malware families can exploit DNS encryption to their advantage for botnet communications and/or data exfiltration. Third, we discuss existing inference methods for profiling normal patterns and/or detecting malicious encrypted DNS traffic. Several directions are presented to motivate future research in enhancing the performance and security of DNS encryption.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源