Performance Evaluation of Secure and Privacy-preserving DNS at the 5G Edge

Y Hanna, D Pineda, K Akkaya… - 2023 IEEE 20th …, 2023 - ieeexplore.ieee.org
With the improved network performance and efficiency, 5G has been a very appealing
alternative for various applications and devices, including but not limited to Industrial IoT …

Information-Based Heavy Hitters for Real-Time DNS Data Exfiltration Detection and Prevention

Y Ozery, A Nadler, A Shabtai - arXiv preprint arXiv:2307.02614, 2023 - arxiv.org
Data exfiltration over the DNS protocol and its detection have been researched extensively
in recent years. Prior studies focused on offline detection methods, which although capable …

[PDF][PDF] 基于双分支特征提取和自适应胶囊网络的DGA 域名检测方法

杨宏宇, 章涛, 张良, 成翔, 胡泽 - 软件学报, 2024 - jos.org.cn
面向域名生成算法(DGA, domain generation algorithm) 的域名检测方法普遍具有特征提取能力
弱, 特征信息压缩比高等特点, 这导致特征信息丢失, 特征结构破坏以及域名检测效果较差等诸多 …

面向新型关键基础设施的密码应用安全性评估技术综述

李高磊, 李建华, 周志洪, 张昊 - 网络与信息安全学报, 2023 - infocomm-journal.com
随着5G/6G, 人工智能, 区块链等新型技术在各领域的深度融合发展, 以高速率全时段信号覆盖,
智能化精细化城市管理以及深空深海科学创新实验场为代表的新型关键基础设施建设迈进新 …

CCSv6: A Detection Model for DNS-over-HTTPS Tunnel Using Attention Mechanism over IPv6

L Jiao, Y Zhu, X Fu, Y Zhou, F Qin… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
In this paper, we first show DNS-over-HTTPS (DoH) tunneling detection methods verified to
be effective over IPv4 can be applied to IPv6, and then propose a new model called CCSv6 …

Toward Automated DNS Tampering Detection Using Machine Learning

P Calle, L Savitsky, AN Bhagoji… - Free and Open …, 2024 - petsymposium.org
DNS manipulation is one of the most prevalent and effective techniques for censoring
Internet access and interfering with users online activities worldwide. Reliable detection of …

Advancing DNS Performance Through an Adaptive Transport Layer Security Model (ad-TLSM).

OB Ohwo, FY Ayankoya, OF Ajayi… - … des Systèmes d' …, 2023 - search.ebscohost.com
The present study endeavors to enhance DNS over TLS performance via the development
of an Adaptive Transport Layer Security Model (ad-TLSM). DNS over TLS, which employs …

[PDF][PDF] The Need to Improve DNS Security Architecture: An Adaptive Security Approach''

DO Alao, FY Ayankoya, OF Ajayi… - Information Dynamics …, 2023 - library.acadlore.com
The Domain Name System (DNS) is an essential component of the internet infrastructure.
Due to its importance, securing DNS becomes a necessity for current and future networks …

A security model for DNS tunnel detection on cloud platform

LSB Borges, R de Oliveira Albuquerque… - 2022 Workshop on …, 2022 - ieeexplore.ieee.org
DNS tunneling uses DNS protocol features to establish command and control channels thus
being possibly exploited as a malicious tool for data exfiltration. DNS tunneling security …

Privacy Leakage of DNS over QUIC: Analysis and Countermeasure

G Hu, K Fukuda - … on Artificial Intelligence in Information and …, 2024 - ieeexplore.ieee.org
Original DNS packets are unencrypted, which leads to information leakage while users visit
websites. The adversary could monitor the DNS communication and infer the users' Internet …