[HTML][HTML] A systematic review on machine learning and deep learning models for electronic information security in mobile networks

C Gupta, I Johri, K Srinivasan, YC Hu, SM Qaisar… - Sensors, 2022 - mdpi.com
Today's advancements in wireless communication technologies have resulted in a
tremendous volume of data being generated. Most of our information is part of a widespread …

A comprehensive survey on DNS tunnel detection

Y Wang, A Zhou, S Liao, R Zheng, R Hu, L Zhang - Computer Networks, 2021 - Elsevier
Abstract Domain Name System (DNS) tunnels, established between the controlled host and
master server disguised as the authoritative domain name server, can be used as a secret …

Detection of doh tunnels using time-series classification of encrypted traffic

M MontazeriShatoori, L Davidson… - 2020 IEEE Intl Conf …, 2020 - ieeexplore.ieee.org
Computer networks have fallen easy prey to cyber attacks in the ever-evolving internet
services. Domain Name System (DNS) has also not remained untouched with these …

Detection of malicious and low throughput data exfiltration over the DNS protocol

A Nadler, A Aminov, A Shabtai - Computers & Security, 2019 - Elsevier
In the presence of security countermeasures, a malware designed for data exfiltration must
use a covert channel to achieve its goal. The Domain Name System (DNS) protocol is a …

DNS covert channel detection method using the LSTM model

S Chen, B Lang, H Liu, D Li, C Gao - Computers & Security, 2021 - Elsevier
DNS is a kind of basic network protocol that is rarely blocked by firewalls; therefore, it is used
to build covert channels. Malicious DNS covert channels play an important role in data …

Monitoring enterprise DNS queries for detecting data exfiltration from internal hosts

J Ahmed, HH Gharakheili, Q Raza… - … on Network and …, 2019 - ieeexplore.ieee.org
Enterprise networks constantly face the threat of valuable and sensitive data being stolen by
cyber-attackers. Sophisticated attackers are increasingly exploiting the Domain Name …

DNS tunneling detection method based on multilabel support vector machine

A Almusawi, H Amintoosi - Security and Communication …, 2018 - Wiley Online Library
DNS tunneling is a method used by malicious users who intend to bypass the firewall to
send or receive commands and data. This has a significant impact on revealing or releasing …

A byte-level CNN method to detect DNS tunnels

C Liu, L Dai, W Cui, T Lin - 2019 IEEE 38th International …, 2019 - ieeexplore.ieee.org
DNS tunnel is a technology used to bypass firewalls for data exfiltration. It takes advantage
of the characteristic of firewalls that always allow DNS traffic pass. Most of the studies have …

[HTML][HTML] KRTunnel: DNS channel detector for mobile devices

S Wang, L Sun, S Qin, WM Li, W Liu - Computers & Security, 2022 - Elsevier
Nowadays, DNS channel attacks on mobile devices have become a challenging threat.
Attackers usually attack mobile devices and steal information with the help of DNS channel …

AAE-DSVDD: A one-class classification model for VPN traffic identification

S Lv, C Wang, Z Wang, S Wang, B Wang, Y Zhang - Computer Networks, 2023 - Elsevier
Abstract Virtual Private Network (VPN) can provide a concealed transmission channel for
communication and protect the privacy of users. However, it also brings hidden dangers to …