Despite the variety and number of network security devices and policies available, sensitive data, such as intellectual property and business data, can still be surreptitiously sent via the Internet to unscrupulous receivers. Furthermore, few security mechanisms address securing or limiting covert channels. This study defines a framework for determining a rule set to minimize covert channel capacity on the DNS protocol specifically. The information and techniques used in this study may be useful in aiding security professionals and developers with enforcing security policies on DNS and other Internet protocols.;This research resulted in the development of a rudimentary tool, referred to as NV-DNS, capable of detecting and effectively limiti...
none2In this work we show how the infrastructure of the Domain Name System (DNS) can be profitably e...
In this work we show how the infrastructure of the Domain Name System (DNS) can be profitably exploi...
Abstract. Attackers in particular botnet controllers use stealthy mes-saging systems to set up large...
Covert channels are used as a means of secretly transferring information when there is a need to hid...
This paper presents possibility of using of the DNS (Domain Name System) protocol for creating a sim...
Covert channel communications are of vital importance for the ill-motivated purposes of cyber-crooks...
Most networks are connected to the Internet through firewalls to block attacks from the outside and ...
International audienceCovert channels inside DNS allow evasion of networks which only provide a rest...
The Domain Name System (DNS) protocol is a fundamental part of Internet activities that can be abuse...
The Domain Name System (DNS) protocol is a fundamental part of Internet activities that can be abuse...
The Domain Name System (DNS) protocol is a fundamental part of Internet activities that can be abuse...
The Internet has emerged as one of the most important tools of communication. With around 4.5 billio...
Unauthorized data removal and modification from information systems represents a major and formidabl...
The cyber arms race has red and blue teams continuously at their toes to keep ahead. Increasingly ca...
In this work we show how the infrastructure of the Domain Name System (DNS) can be profitably exploi...
none2In this work we show how the infrastructure of the Domain Name System (DNS) can be profitably e...
In this work we show how the infrastructure of the Domain Name System (DNS) can be profitably exploi...
Abstract. Attackers in particular botnet controllers use stealthy mes-saging systems to set up large...
Covert channels are used as a means of secretly transferring information when there is a need to hid...
This paper presents possibility of using of the DNS (Domain Name System) protocol for creating a sim...
Covert channel communications are of vital importance for the ill-motivated purposes of cyber-crooks...
Most networks are connected to the Internet through firewalls to block attacks from the outside and ...
International audienceCovert channels inside DNS allow evasion of networks which only provide a rest...
The Domain Name System (DNS) protocol is a fundamental part of Internet activities that can be abuse...
The Domain Name System (DNS) protocol is a fundamental part of Internet activities that can be abuse...
The Domain Name System (DNS) protocol is a fundamental part of Internet activities that can be abuse...
The Internet has emerged as one of the most important tools of communication. With around 4.5 billio...
Unauthorized data removal and modification from information systems represents a major and formidabl...
The cyber arms race has red and blue teams continuously at their toes to keep ahead. Increasingly ca...
In this work we show how the infrastructure of the Domain Name System (DNS) can be profitably exploi...
none2In this work we show how the infrastructure of the Domain Name System (DNS) can be profitably e...
In this work we show how the infrastructure of the Domain Name System (DNS) can be profitably exploi...
Abstract. Attackers in particular botnet controllers use stealthy mes-saging systems to set up large...