Основні поняття
Balancing security with resource constraints for effective DNS-tunneling attack detection in real-time.
Анотація
Authors address the challenge of implementing ML and DL-based security solutions on resource-constrained devices.
Emphasis on practicality and feasibility of real-time detection methods.
Proposed end-to-end process for DNS-tunneling attack detection in routers.
Importance of lightweight features, network configuration agnosticism, and high detection accuracy.
Evaluation of model performance in controlled, real-time, and new environment settings.
Detailed analysis of feature selection, model deployment on a router, and latency assessment.
Статистика
"The accuracy of 93.05% underscores the model’s capability to make correct predictions across diverse scenarios."
"Latency of less than 1 ms attests to the router’s adeptness in quick decision-making."
Цитати
"No research has focused on evaluating the suitability of these features and models in real-world scenarios for real-time detection."
"Our study focuses on the vital connection between device networks security and limited resources."