What is DNS Monitoring?
DNS Monitoring is the active inspection and analysis of DNS (Domain Name System) traffic to detect suspicious or unwanted domain lookups . It
is a powerful technique for spotting malware communication, data exfiltration and APT activity β often before other security measures react.
In OT environments, DNS Monitoring helps protect
systems such as Engineering Station s, Historian s
and Remote Maintenance portals.
π§ Why is DNS traffic interesting to attackers?
Use of DNS by attackers
Explanation
Data exfiltration via DNS
Sending data inside DNS queries (DNS tunnelling)
Command & Control communication
Malware retrieves instructions via subdomains (e.g. cmd1.attacker.com)
Evasion of detection
DNS is often not blocked or logged in OT
Dynamic domains (DDNS)
Attackerβs IP address rotates automatically via DNS
π What do you see in DNS Monitoring?
Behaviour
Suspicious?
Unknown domains outside the whitelist
Yes β especially when newly registered
Long or encoded subdomains
Yes β possible exfiltration or C2 activity
Frequent DNS traffic to a single domain
Yes β indicates a persistent connection
Traffic from HMI/PLC to DNS
Yes β unusual in air-gapped OT systems
Requests to domains with poor reputation
Yes β possible malware
βοΈ Implementation in OT
Monitoring location
Explanation
Jump Server or proxy
Central point for DNS traffic leaving the OT zone
Firewall with DNS logging
Logs outbound DNS requests from OT systems
SIEM integration
Analyses DNS logs for IOCs and anomalous behaviour
Passive Monitoring network taps
Observes DNS traffic without impact on production
π Link with detection & response
β
Best practices
Build a DNS whitelist : which domains should OT systems be able to reach at all?
Detect traffic to new or recently registered domains
Combine with URL Filtering and Application Whitelisting
Deploy DNS monitoring at all exits to IT or internet zones
Account for false positives from industrial cloud services (e.g. remote HMI portals)
π In summary
DNS Monitoring is a quiet but powerful way to detect cyber attacks early , particularly in
environments where Malware has few other
ways to communicate.