[HTML][HTML] A Comprehensive Review of Tunnel Detection on Multilayer Protocols: From Traditional to Machine Learning Approaches

Z Sui, H Shu, F Kang, Y Huang, G Huo - Applied Sciences, 2023 - mdpi.com
Tunnels, a key technology of traffic obfuscation, are increasingly being used to evade
censorship. While providing convenience to users, tunnel technology poses a hidden …

AAE-DSVDD: A one-class classification model for VPN traffic identification

S Lv, C Wang, Z Wang, S Wang, B Wang, Y Zhang - Computer Networks, 2023 - Elsevier
Abstract Virtual Private Network (VPN) can provide a concealed transmission channel for
communication and protect the privacy of users. However, it also brings hidden dangers to …

[HTML][HTML] Towards a Near-Real-Time Protocol Tunneling Detector Based on Machine Learning Techniques

F Sobrero, B Clavarezza, D Ucci, F Bisio - Journal of Cybersecurity and …, 2023 - mdpi.com
In the very recent years, cybersecurity attacks have increased at an unprecedented pace,
becoming ever more sophisticated and costly. Their impact has involved both private/public …

Performance Evaluation of Neural Network Techniques for Short-Range Wind Energy Estimation

AG Ameen, S Mohamed… - … Middle East Power …, 2023 - ieeexplore.ieee.org
Several countries all over the world are experiencing major consequences for the
environment, and the most viable approach for mitigating these is the consumption of …

DNS Tunnel Detection for Low Throughput Data Exfiltration via Time-Frequency Domain Analysis

X Liu, W Mao, A Wang, Z Li, H Xue… - ICC 2023-IEEE …, 2023 - ieeexplore.ieee.org
Domain Name System (DNS) is one of the most common and vital services on the Internet.
Attackers take advantage of DNS tunneling to bypass firewalls for data exfiltration, which has …

OptiTuneD: An Optimized Framework for Zero-Day DNS Tunnel Detection Using N-Grams

N Sharma, M Swarnkar - 2023 IEEE International Conference …, 2023 - ieeexplore.ieee.org
Domain Name System (DNS) is an essential Internet component that resolves domain
names into IP addresses. Traditionally, the DNS protocol was not intended to carry data but …

Improving DNS Data Exfiltration Detection Through Temporal Analysis

G Spathoulas, M Anagnostopoulos… - … on Ubiquitous Security, 2023 - Springer
By leveraging the DNS tunneling technique, malicious actors have the ability to transfer
covertly data embedded within a DNS transaction. A DNS tunnel can be used as a …

Apprentissage automatique non supervisé pour la détection de trafics illégitimes

TQ Nguyen - 2023 - theses.hal.science
Les cyber-attaques de plus en plus sophistiquées, préméditées et ciblées telles que les
menaces persistantes avancées (APTs) peuvent être perpétrées sur des périodes de temps …

Detection of Data Leakage Based on DNS Traffic

S Zhang, Z Han, K Jiang - 2023 IEEE 5th International …, 2023 - ieeexplore.ieee.org
In recent years, malicious software that utilizes covert channels to transmit private data has
become increasingly prevalent. The privacy information of affected users, such as accounts …

Health Care DNS Tunnelling Detection Method via Spiking Neural Network

N Kumar, R Surendiran, GKJ Samuel… - … and Biomedical Systems, 2023 - Springer
A common DNS exploit that has been used for several decades to steal data is DNS
tunneling. To avoid being detected as an intrusion from healthcare domain, the stolen health …