Quick Search:

An Explainable AI-Based Intrusion Detection System for DNS Over HTTPS (DoH) Attacks

Zebin, Tahmina ORCID logoORCID: https://orcid.org/0000-0003-0437-0570, Rezvy, Shahadate ORCID logoORCID: https://orcid.org/0000-0002-2684-7117 and Luo, Yuan ORCID logoORCID: https://orcid.org/0000-0002-9812-5543 (2022) An Explainable AI-Based Intrusion Detection System for DNS Over HTTPS (DoH) Attacks. IEEE Transactions on Information Forensics and Security, 17. pp. 2339-2349.

[thumbnail of paper_acceptance email.pdf]
Preview
Text
paper_acceptance email.pdf - Accepted Version

| Preview

Abstract

Over the past few years, Domain Name Service (DNS) remained a prime target for hackers as it enables them to gain first entry into networks and gain access to data for exfiltration. Although the DNS over HTTPS (DoH) protocol has desirable properties for internet users such as privacy and security, it also causes a problem in that network administrators are prevented from detecting suspicious network traffic generated by malware and malicious tools. To support their efforts in maintaining a secure network, in this paper, we have implemented an explainable AI solution using a novel machine learning framework. We have used the publicly available CIRA-CIC-DoHBrw-2020 dataset for developing an accurate solution to detect and classify the DNS over HTTPS attacks. Our proposed balanced and stacked Random Forest achieved very high precision (99.91%), recall (99.92%) and F1 score (99.91%) for the classification task at hand. Using explainable AI methods, we have additionally highlighted the underlying feature contributions in an attempt to provide transparent and explainable results from the model.

Item Type: Article
Status: Published
DOI: 10.1109/TIFS.2022.3183390
School/Department: London Campus
URI: https://ray.yorksj.ac.uk/id/eprint/6523

University Staff: Request a correction | RaY Editors: Update this record