Anomaly Detection in DDI Central

The Anomaly Detection Engine in DDI Central is designed to enhance network security posture through real-time detection of abnormal DNS and DHCP behavior. It leverages a dual approach: a comprehensive library of built-in detection rules tailored for known protocol-level anomalies, and Zoho’s ZIA AI engine, which applies machine learning models to identify advanced threats such as Domain Generation Algorithm (DGA) patterns.

By correlating behavioral patterns and traffic anomalies early in the lifecycle—often before external threat intelligence sources classify them—the engine enables timely containment and analysis. This proactive threat detection capability helps prevent the propagation of malicious activity within the network and ensures administrators can respond before service integrity or security is compromised.

DNS and DHCP anomalies detected by DDI Central

Note: All the anomalies below are predefined within DDI Central's Anomaly Detection engine.

Early Quarantine via Anomaly Detection Engine
DDI Central’s anomaly detection engine proactively identifies and isolates suspicious DNS/DHCP behaviors in real time—before they are officially flagged by threat intelligence feeds or cybersecurity authorities. Detected anomalies are immediately quarantined to prevent entry into the network, ensuring zero exposure until administrative investigation and remediation are completed.
 
 

DNS anomalies detected by DDI Central

AnomalyKey indicatorsExample occurrenceWhy it mattersTypical mitigation / DDI Central action
DGA (Domain Generation Algorithm)High-entropy labels; very long labels; digit/hex-heavy patterns; suspicious TLDs (e.g. .xyz, .top), semantically crafted wordlist as domain names and seed based DGA domainsHost queries dozens of random-looking domains like xk3j9qz8a.top within minutesOften indicates malware C2 or evasive domainsBlock quries to domains, quarantine the hosts making queries from the nework. Admins can revive these hosts anytime after proper remediation.
DNS TunnelingHigh query volume; TXT-heavy queries; long qnames/subdomains; Base64-like labels; periodic timingClient sends TXT queries every 30s containing Base64 blobs to same domainCovert exfiltration or C2 channel via DNSThrottle queries using response rate limiting policies. The anomaly engine blocks queries, quarantine hosts making such queries.
Subdomain EnumerationLarge unique subdomain count (e.g., ≥30/≥60); sequential patterns (foo1, foo2…)Scanner probes api1.example.comapi60.example.com within minutesReconnaissance for takeover or brute-force attacksRate-limit or block those subdomains, quarantine probing hosts.
Query Type AnomalySpike in rare qtypes (NULL, ANY, DS, DNSKEY); TXT >60% of queriesClient issues 80% of queries as TXT or NULL over 5 minutesUncommon qtypes can be used for tunneling or probing.Blocks offending clients as well as the queries to such suspicious domains.
Windows-specific anomaliesPolicy violations; excessive wpad. queries; high REFUSED ratesMany clients repeatedly query wpad.corp.local and receive REFUSEDWPAD abuse can be used for MITMEnforce policies that block offending clients as well as such queries. Logs details for forensics in Anomaly reports.
RCODE anomaliesSpikes in NXDOMAIN/SERVFAIL/REFUSED; high failure ratio vs total responsesResolver reports 70% NXDOMAIN responses in a short windowMay indicate mass brute-force, resolver stress, or misconfigurationApplies RRL response rate limiting, identifies and isolates offending sources and blocks all the domains they are accessing.

DHCPv4 anomalies detected by DDI Central

AnomalyKey indicatorsExample occurrenceWhy it mattersTypical mitigation / DDI Central action
StaleLeaseLease end time < current time but entry still present in DB/files10.10.10.50 lease expired yesterday but remains listedOrphaned records → inventory drift and confusionFlags for cleanup by DNS scavenging if configured. Reconcile with DHCP server and removes stale lease entries.
LeaseDuration anomalyVery short or very long lease durations compared to policyScopes issuing 1-minute leases causing churnMisconfiguration → exhaustion risk or abuse persistenceQuickly blocks such hosts. Admin can revive them later and adjust scope lifetimes.
DuplicateIPSame IP leased to multiple MACs simultaneously10.10.10.100 assigned to MAC A and MAC B at same timeIP conflicts, spoofing, service disruptionQuarantines all the conflicting MACs.
MultipleIPsPerMACA single MAC holds multiple IPsLaptop MAC shows leases for 10.10.10.12 and 10.10.10.55Multi-homing or spoofing; inventory mismatchEnforces immediate blocking until further investigation
RapidLeaseSame MAC requesting many leases in a short timeframeDevice requests 200 leases over 2 minutesLease churn → DoS or exhaustion attemptsQuarantines the suspicious client
Starvation (DHCPv4 only. Not Applicable for DHCPv6)Many unique MACs requesting leases rapidlyHundreds of random MACs request leases in <5 mins; pool nearly depletedDHCP pool exhaustion / starvation attackInstantly blocks all the conflicting entities until further investigation

DHCPv6 anomalies detected by DDI Central

AnomalyKey indicatorsExample occurrenceWhy it mattersTypical mitigation / DDI Central action
StaleLease (IPv6)Expired lease still present in DB or files2001:db8:1::100 lease expired but remains listedOrphaned addresses; inaccurate inventoryBlock the conflicting entities until admin reconciles/cleansup the conflicting leases.
LeaseDuration (IPv6)Lease duration unusually short (possible misconfiguration) or too long (may allow abuse).IA_NA lifetime set to 1 minute causing churnMisconfiguration or abuse persistence windowEnforce quarantines for the conflicting hosts until admin enforces limits over lease lifetimes for the subnet
DuplicateIP / DuplicateDUIDSame IPv6 assigned to multiple DUIDs or same DUID on multiple hosts2001:db8:1::10 appears from two different DUIDsAddress conflicts, spoofing, service disruptionQuarantine affected endpoints; investigate
MultipleIPsPerClient (DUID/IAID)One client (identified by DUID or DUID+IAID) requesting multiple IP addressesOne client is requesting and receiving multiple IPs, using 10 different IAIDs under the same DUID.Misuse or multi-interface abuseQuickly blocks the client until admin investigates to identify if its from legit sources e.g., multi-interface routers, VMs, containerized apps), or via suspicious behaviour (e.g., misconfigurations, malicious clients trying to exhaust IPs).
RapidLease (IPv6)Repeated rapid solicit/requests by same DUID/IAIDDUID issues 500 solicitations in 10 minutesLease churn / PD exhaustion attempts. May exhaust IPv6 leases or PDs, disrupting legitimate client access and DHCP stability.Blocks offending clients until further investigation
Excessive IAIDsA single DUID associated with many IAIDsSingle DUID shows 50 IAIDs assignedAbnormal IAID inflation may indicate spoofing or compromised clients, leading to address allocation instability.Blocks offending clients until further investigation

Severity stratification in DDI Central

 

DDI Central assigns a severity score to every detected anomaly described above to help teams understand its potential impact at a glance.

Note: The same anomaly category can produce varying scores depending on the strength, frequency, and behavioral pattern of the signals observed.

Likewise, a single suspicious domain may be flagged across multiple anomaly categories—such as DGA, tunneling, or suspicious TLDs—which compounds its overall risk score and elevates its severity.

To standardize interpretation, DDI Central classifies anomalies into four severity bands:

 
Severity BandScore RangeDescription
Low0 — 20Minor or weak signals; suitable for monitoring.
Medium21 — 50Noticeable anomalies that may warrant review.
High51 — 80Strong indicators of risky or abnormal behavior.
Critical81 — 100Severe threats requiring immediate investigation.
 

This stratification enables admins and leaders to prioritize investigation with clear, quantifiable thresholds—ensuring that high-risk patterns stand out immediately for rapid validation and response.