A comprehensive survey on DNS tunnel detection

Y Wang, A Zhou, S Liao, R Zheng, R Hu, L Zhang - Computer Networks, 2021 - Elsevier
Abstract Domain Name System (DNS) tunnels, established between the controlled host and
master server disguised as the authoritative domain name server, can be used as a secret …

[PDF][PDF] Sans institute infosec reading room

RF Rights - Risk, 2001 - picture.iczhiku.com
As Technology pushes the limits of removable media-so drives the need for a new file
system in order to support the larger capacities and faster access speeds being designed …

DNS tunneling detection by cache-property-aware features

N Ishikura, D Kondo, V Vassiliades… - … on Network and …, 2021 - ieeexplore.ieee.org
Many enterprises are under threat of targeted attacks aiming at data exfiltration. To launch
such attacks, in recent years, attackers with their malware have exploited a covert channel …

Covert channels in TCP/IP protocol stack-extended version

A Mileva, B Panajotov - Open Computer Science, 2014 - degruyter.com
Covert channels in TCP/IP protocol stack - extended version- Skip to content Should you have
institutional access? Here's how to get it ... De Gruyter € EUR - Euro £ GBP - Pound $ USD …

Malicious DNS tunnel tool recognition using persistent DoH traffic analysis

R Mitsuhashi, Y Jin, K Iida… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
DNS over HTTPS (Do) can mitigate the risk of privacy breaches but makes it difficult to
control network security services due to the DNS traffic encryption. However, since malicious …

Detection of malicious payload distribution channels in DNS

AM Kara, H Binsalleeh, M Mannan… - 2014 IEEE …, 2014 - ieeexplore.ieee.org
Botmasters are known to use different protocols to hide their activities. Throughout the past
few years, several protocols have been abused, and recently Domain Name System (DNS) …

Flow-based detection of DNS tunnels

W Ellens, P Żuraniewski, A Sperotto… - … Mechanisms for the …, 2013 - Springer
DNS tunnels allow circumventing access and security policies in firewalled networks. Such a
security breach can be misused for activities like free web browsing, but also for command & …

Something from nothing (There): collecting global IPv6 datasets from DNS

T Fiebig, K Borgolte, S Hao, C Kruegel… - Passive and Active …, 2017 - Springer
Current large-scale IPv6 studies mostly rely on non-public datasets, as most public datasets
are domain specific. For instance, traceroute-based datasets are biased toward network …

[PDF][PDF] Basic concepts and models of cybersecurity

D Herrmann, H Pridöhl - The ethics of cybersecurity, 2020 - library.oapen.org
This introductory chapter reviews the fundamental concepts of cybersecurity. It begins with
common threats to information and systems to illustrate how matters of security can be …

[HTML][HTML] Real time detection of malicious DoH traffic using statistical analysis

M Moure-Garrido, C Campo, C Garcia-Rubio - Computer Networks, 2023 - Elsevier
The DNS protocol plays a fundamental role in the operation of ubiquitous networks. All
devices connected to these networks need DNS to work, both for traditional domain name to …