Evading DoH via Live Memory Forensics for Phishing Detection and Content Filtering

2021 International Conference on COMmunication Systems & NETworkS (COMSNETS)(2021)

引用 5|浏览1
暂无评分
摘要
Internet will see a boost in the DNS over HTTPS (DoH) traffic to enhance user privacy. The existing mechanisms of monitoring/filtering DNS traffic at end points/gateways that rely on URLs (either received via operating system DNS Client or via header analysis of DNS queries over network) will not work. In this paper, we propose a novel idea to uncover the DoH traffic by directly sniffing URLs from the RAM of end points/client machines. Our approach can be used by an organization's content filtering and phishing detection solutions. The contents viewed from their computing systems by employees can be monitored and controlled even when they use browsers supporting DoH to hide DNS queries. Our experimental analysis demonstrates feasibility, effectiveness and robustness of the proposed idea.
更多
查看译文
关键词
user privacy,DNS traffic,header analysis,DoH traffic,DNS queries,live memory forensics,phishing detection,content filtering,Internet,gateways,operating system DNS client,browsers,DNS over HTTPS traffic,URL sniffing
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要