This thesis describes the design and implementation of system for effective detection of network anomaly using DNS data. Effective detection is accomplished by combination and cooperation of detectors and detection techniques. Flow data in NetFlow and IPFIX formats are used as input for detection. Also packets in pcap format can be used. Main focus is put on detection of DNS tunneling. Thesis also describes Domain Name System (DNS) and anomalies associated with DNS
Part 6: Monitoring MechanismsInternational audienceDNS tunnels allow circumventing access and securi...
DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security...
The aim of this thesis is the detection of malicious spammer hosts based on passive analysis of capt...
This bachelor’s thesis deals with DNS anomaly detection in captured network traffic based on t...
This master thesis is written in collaboration with NIC.CZ company. It describes basic principles of...
The work analyze current detection methods of anomalies and security incidents in DNS traffic, and t...
The aim of this thesis is the detection of malicious domains based on passive analysis of DNS traffi...
This thesis describes the use of NetFlow data in the systems for detection of disruptions or anomali...
DNS (Domain Name System)-based name resolutionservice is one of the most fundamental Internet servic...
This master thesis deals with detecting anomalies methods in network traffic. First of all this thes...
DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security...
This paper surveys the problems, related to network traffic analysis to detect anomalies, particula...
Abstract. DNS tunnels allow circumventing access and security policies in firewalled networks. Such ...
DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security...
DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security...
Part 6: Monitoring MechanismsInternational audienceDNS tunnels allow circumventing access and securi...
DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security...
The aim of this thesis is the detection of malicious spammer hosts based on passive analysis of capt...
This bachelor’s thesis deals with DNS anomaly detection in captured network traffic based on t...
This master thesis is written in collaboration with NIC.CZ company. It describes basic principles of...
The work analyze current detection methods of anomalies and security incidents in DNS traffic, and t...
The aim of this thesis is the detection of malicious domains based on passive analysis of DNS traffi...
This thesis describes the use of NetFlow data in the systems for detection of disruptions or anomali...
DNS (Domain Name System)-based name resolutionservice is one of the most fundamental Internet servic...
This master thesis deals with detecting anomalies methods in network traffic. First of all this thes...
DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security...
This paper surveys the problems, related to network traffic analysis to detect anomalies, particula...
Abstract. DNS tunnels allow circumventing access and security policies in firewalled networks. Such ...
DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security...
DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security...
Part 6: Monitoring MechanismsInternational audienceDNS tunnels allow circumventing access and securi...
DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security...
The aim of this thesis is the detection of malicious spammer hosts based on passive analysis of capt...