DNS fingerprint based on user activity

基于用户活动的 DNS 指纹

阅读:1

Abstract

The Domain Name System (DNS) plays a critical role in the functioning of the Internet, providing essential resolution services for nearly all user activities. In this work, we examine the hypothesis that individual users exhibit recurrent and distinctive patterns in their DNS query behavior, which can be leveraged to create unique and robust user fingerprints. Building on a publicly available dataset of real DNS traffic collected from a large-scale network, we evaluate the feasibility of user identification solely based on these behavioral DNS traces, independent of IP address stability. We conducted a comparative study of several machine learning models - including Naive Bayes, Random Forests, XGBoost, Multilayer Perceptrons, and Convolutional Neural Networks - on their ability to classify users based on domain category frequencies and derived statistical features. After extensive data preprocessing, dimensionality reduction, and feature selection, our best-performing model (CNN) achieves a classification accuracy of 86.7% across 1727 classes (unique IP addresses). The results confirm the viability of DNS-based user fingerprinting, even in the presence of dynamic IP addresses. Our approach opens new avenues for applications in network forensics and anomaly detection, while also raising important questions about privacy and ethical use of passive traffic analysis.

特别声明

1、本页面内容包含部分的内容是基于公开信息的合理引用;引用内容仅为补充信息,不代表本站立场。

2、若认为本页面引用内容涉及侵权,请及时与本站联系,我们将第一时间处理。

3、其他媒体/个人如需使用本页面原创内容,需注明“来源:[生知库]”并获得授权;使用引用内容的,需自行联系原作者获得许可。

4、投稿及合作请联系:info@biocloudy.com。