Abstract The Domain Name System (DNS) is one of the most important components of today's Internet, and is the standard naming convention between human-readable domain …
Miscreants register thousands of new domains every day to launch Internet-scale attacks, such as spam, phishing, and drive-by downloads. Quickly and accurately determining a …
DNS tunneling is a typical attack adopted by cyber-criminals to compromise victims' devices, steal sensitive data, or perform fraudulent actions against third parties without their …
The Internet Engineering Task Force adopted the DNS over HTTPS protocol in 2018 to remediate privacy issues regarding the plain text transmission of the DNS protocol …
N Ishikura, D Kondo, V Vassiliades… - … on Network and …, 2021 - ieeexplore.ieee.org
Many enterprises are under threat of targeted attacks aiming at data exfiltration. To launch such attacks, in recent years, attackers with their malware have exploited a covert channel …
J Liang, S Wang, S Zhao, S Chen - Computers & Security, 2023 - Elsevier
As the basic service of the network, the Domain Name System (DNS) is almost never blocked by the firewall. DNS tunnel takes advantage of this feature of DNS service to …
A Vetterl, R Clayton - 12th USENIX Workshop on Offensive Technologies …, 2018 - usenix.org
The current generation of low-and medium interaction honeypots uses off-the-shelf libraries to provide the transport layer. We show that this architecture is fatally flawed because the …
Studies show that a significant portion of networked computers are infected with stealthy malware. Infection allows remote attackers to control, utilize, or spy on victim machines …
Malicious software activities have become more and more clandestine, making them challenging to detect. Existing security solutions rely heavily on the recognition of known …