IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v17y2025i7p319-d1706672.html
   My bibliography  Save this article

An Improved Approach to DNS Covert Channel Detection Based on DBM-ENSec

Author

Listed:
  • Xinyu Li

    (School of Information Engineering, Institute of Disaster Prevention, Langfang 065201, China
    Langfang Key Laboratory of Network Emergency Protection and Network Security, Langfang 065201, China)

  • Xiaoying Wang

    (School of Information Engineering, Institute of Disaster Prevention, Langfang 065201, China
    Langfang Key Laboratory of Network Emergency Protection and Network Security, Langfang 065201, China)

  • Guoqing Yang

    (School of Information Engineering, Institute of Disaster Prevention, Langfang 065201, China
    Langfang Key Laboratory of Network Emergency Protection and Network Security, Langfang 065201, China)

  • Jinsha Zhang

    (School of Information Engineering, Institute of Disaster Prevention, Langfang 065201, China
    Langfang Key Laboratory of Network Emergency Protection and Network Security, Langfang 065201, China)

  • Chunhui Li

    (School of Information Engineering, Institute of Disaster Prevention, Langfang 065201, China
    Langfang Key Laboratory of Network Emergency Protection and Network Security, Langfang 065201, China)

  • Fangfang Cui

    (School of Information Engineering, Institute of Disaster Prevention, Langfang 065201, China
    Langfang Key Laboratory of Network Emergency Protection and Network Security, Langfang 065201, China)

  • Ruize Gu

    (School of Information Engineering, Institute of Disaster Prevention, Langfang 065201, China
    Langfang Key Laboratory of Network Emergency Protection and Network Security, Langfang 065201, China)

Abstract

The covert nature of DNS covert channels makes them a widely utilized method for data exfiltration by malicious attackers. In response to this challenge, the present study proposes a detection methodology for DNS covert channels that employs a Deep Boltzmann Machine with Enhanced Security (DBM-ENSec). This approach entails the creation of a dataset through the collection of malicious traffic associated with various DNS covert channel attacks. Time-dependent grouping features are excluded, and feature optimization is conducted on individual traffic data through feature selection and normalization to minimize redundancy, enhancing the differentiation and stability of the features. The result of this process is the extraction of 23-dimensional features for each DNS packet. The extracted features are converted to gray scale images to improve the interpretability of the model and then fed into an improved Deep Boltzmann Machine for further optimization. The optimized features are then processed by an ensemble of classifiers (including Random Forest, XGBoost, LightGBM, and CatBoost) for detection purposes. Experimental results show that the proposed method achieves 99.92% accuracy in detecting DNS covert channels, with a validation accuracy of up to 98.52% on publicly available datasets.

Suggested Citation

  • Xinyu Li & Xiaoying Wang & Guoqing Yang & Jinsha Zhang & Chunhui Li & Fangfang Cui & Ruize Gu, 2025. "An Improved Approach to DNS Covert Channel Detection Based on DBM-ENSec," Future Internet, MDPI, vol. 17(7), pages 1-28, July.
  • Handle: RePEc:gam:jftint:v:17:y:2025:i:7:p:319-:d:1706672
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/17/7/319/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/17/7/319/
    Download Restriction: no
    ---><---

    More about this item

    Keywords

    ;
    ;
    ;
    ;
    ;

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:17:y:2025:i:7:p:319-:d:1706672. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.