DNS TRAFFIC ANALYSIS FOR CYBER TREAT DETECTION USING MACHINE LEARNING

Authors

  • Mondi Rohith Naga Teja Author
  • Vallireddy Satya Naga Lakshmi Author
  • Pulaparthi Bowmya Srija Author
  • Mulagala Vara Siva Sai Teja Author
  • Nallimilli Manoj Adithya Reddy Author
  • Dr. M.Aravind Kumar Author
  • B.Raju Author

DOI:

https://doi.org/10.62647/

Abstract

DNS traffic analysis is a critical component of modern cybersecurity, enabling the detection of sophisticated threats such as malware, phishing, botnet communications, and data exfiltration that often evade traditional defenses. This study leverages machine learning algorithms—Random Forest, Logistic Regression, and Support Vector Machines (SVM)—to identify malicious DNS traffic through a multi-phase process involving data preprocessing, feature extraction, and model training. Key features like domain name entropy, TTL distributions, and NXDOMAIN ratios enhance classification accuracy. Evaluation using metrics such as accuracy, precision, recall, F1-score, and AUC-ROC confirms the effectiveness of Random Forest and SVM in detecting DNS anomalies, while Logistic Regression offers interpretability. Emphasizing real-time monitoring and adaptive detection, the research highlights how ML-based DNS analysis not only boosts threat detection accuracy but also reduces false positives, supporting efficient, proactive cybersecurity strategies. Future directions include deep learning, unsupervised techniques, and integration with SIEM systems for scalable enterprise deployment.

Downloads

Download data is not yet available.

Downloads

Published

23-04-2025

How to Cite

DNS TRAFFIC ANALYSIS FOR CYBER TREAT DETECTION USING MACHINE LEARNING. (2025). International Journal of Information Technology and Computer Engineering, 13(2), 521-524. https://doi.org/10.62647/