000 03112nam a22002657a 4500
003 KOHA
005 20230710115442.0
008 230710d2023 cy ||||| m||| 00| 0 eng d
040 _aCY-NiCIU
_beng
_cCY-NiCIU
_erda
041 _aeng
090 _aYL 2893
_bE93 2023
100 1 _aEyabi, Gideon Ebi
245 1 0 _aDNS TUNNEL DETECTION WITH ARTIFICIAL INTELLIGENCE /
_cGIDEON EBI EYABI; SUPERVISOR: ASST. PROF. DR. DEVRIM SERAL
264 _c2023
300 _aviii, 50 sheets;
_c31 cm.
_eIncludes CD
336 _2rdacontent
_atext
_btxt
337 _2rdamedia
_aunmediated
_bn
338 _2rdacarrier
_avolume
_bnc
502 _aThesis (MSc) - Cyprus International University. Institute of Graduate Studies and Research Computer Engineering Department
504 _aIncludes bibliography (sheets 49-50)
520 _aABSTRACT The network protocol that translates human-readable names like afraid.com into computational figures like IP addresses that the computer can understand is called DNS. Without DNS, it would be impossible to memorize all the IP addresses of various sites on the internet. In the OSI hierarchy of layers, the DNS appears in the application layer. The DNS uses the UDP and TCP to transmit data. In this paper, the effects of DNS tunneling on corporate networks will be investigated and a possible solution will be approached using artificial intelligence. Basically, this paper will focus on the use of models like K Nearest neighbors, Gaussian Naïve Bias, and the Decision tree Classifiers. These 3 models were chosen due to their individual capabilities. The Nearest K Neighbors is best for its ability to store trained data, and ease the process by letting the algorithm almost bypass the trained dataset phase directly to the testing phase. Thus, when using the K Nearest neighbor as the chosen algorithm and a new test data x is observed, it immediately searches new data in the trained data closest to the data x and gets a prediction. Thus, limiting the phase of training each time new data is presented. Also, Decision tree was used because it has the ability to group similar data in the trained phase as nodes, such that if new data is presented at the test data, it searches prediction based on the closeness of the data to defined node groups. Also, the Gaussian Naïve Bias uses some probability functions to predict future events. Thus, having the knowledge of the trained data B, the Naïve Bias will be able to predict the probability P(A/B). The above algorithms were chosen because they give predictions similar to what is expected in DNS tunnel detection. DNS tunneling various ways through which the tunnels are setup on target systems. One way is through email poisoning, another is through malicious messages and so on. These classifies best fit these scenarios as they are fully equipped for feature predictions based on stored trained data.
650 0 _aInternet domain names
_vDissertations, Academic
650 0 _a Computer networks
_vDissertations, Academic
_xSecurity measures
942 _2ddc
_cTS
999 _c290544
_d290544