The paper proposes effective method of computer network protection from data exfiltration by the system of domain names. Data exfiltration by Domain Name System (DNS) is an approach to conceal the transfer of confidential data to remote adversary using data encapsulation into the requesting domain name. The DNS requests that transfer stolen information from a host infected by malicious software to an external host controlled by a malefactor are considered. The paper proposes a method of detecting such DNS requests based on text classification of domain names by convolutional neural network. The efficiency of the method is based on assumption that domain names exploited for data exfiltration differ from domain names formed from words of natu...
Domain Name Service is a central part of Internet regular operation. Such importance has made it a c...
With the help of botnets, intruders can implement a remote control on infected machines and perform ...
(English) Botnets are generally recognized as one of the most challenging threats on the Internet to...
Domain Name System (DNS) is a protocol for converting numeric IP addresses of websites into a human-...
In this paper we introduce an intrusion detection system for Denial of Service (DoS) attacks against...
The Domain Name Service (DNS) is a central point in the functioning of the internet. Just as organiz...
The Domain Name System (DNS) protocol is a fundamental part of Internet activities that can be abuse...
University of Bina Darma Palembang has its own DNS server and in this study using log data from the ...
Malicious domain names have long been pervasive in the global DNS (Domain Name System) infrastructur...
Master of ScienceDepartment of Computer ScienceEugene VassermanThe first step of accessing any ...
<p class="JDFSLParagraph">The Domain Name Service (DNS) is a critical core component of the global I...
There have been several recent reports that botnet communication between bot-infected computers and ...
Nowadays there are many DNS firewall solutions to prevent users accessing malicious domains. These c...
An effective method for preventing the operation of computer network nodes for organizing a botnet i...
The cyber arms race has red and blue teams continuously at their toes to keep ahead. Increasingly ca...
Domain Name Service is a central part of Internet regular operation. Such importance has made it a c...
With the help of botnets, intruders can implement a remote control on infected machines and perform ...
(English) Botnets are generally recognized as one of the most challenging threats on the Internet to...
Domain Name System (DNS) is a protocol for converting numeric IP addresses of websites into a human-...
In this paper we introduce an intrusion detection system for Denial of Service (DoS) attacks against...
The Domain Name Service (DNS) is a central point in the functioning of the internet. Just as organiz...
The Domain Name System (DNS) protocol is a fundamental part of Internet activities that can be abuse...
University of Bina Darma Palembang has its own DNS server and in this study using log data from the ...
Malicious domain names have long been pervasive in the global DNS (Domain Name System) infrastructur...
Master of ScienceDepartment of Computer ScienceEugene VassermanThe first step of accessing any ...
<p class="JDFSLParagraph">The Domain Name Service (DNS) is a critical core component of the global I...
There have been several recent reports that botnet communication between bot-infected computers and ...
Nowadays there are many DNS firewall solutions to prevent users accessing malicious domains. These c...
An effective method for preventing the operation of computer network nodes for organizing a botnet i...
The cyber arms race has red and blue teams continuously at their toes to keep ahead. Increasingly ca...
Domain Name Service is a central part of Internet regular operation. Such importance has made it a c...
With the help of botnets, intruders can implement a remote control on infected machines and perform ...
(English) Botnets are generally recognized as one of the most challenging threats on the Internet to...