DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security breach can be misused for activities like free web browsing, but also for command & control traffic or cyber espionage, thus motivating the search for effective automated DNS tunnel detection techniques. In this paper we develop such a technique, based on the monitoring and analysis of network flows. Our methodology combines flow information with statistical methods for anomaly detection. The contribution of our paper is twofold. Firstly, based on flow-derived variables that we identified as indicative of DNS tunnelling activities, we identify and evaluate a set of non-parametrical statistical tests that are particularly useful in this conte...
DNS tunneling is a typical attack adopted by cyber-criminals to compromise victims' devices,steal se...
DNS tunneling is a typical attack adopted by cyber-criminals to compromise victims' devices,steal se...
Application-layer tunnels nowadays represent a significant security threat for any network protected...
DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security...
DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security...
DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security...
Abstract. DNS tunnels allow circumventing access and security policies in firewalled networks. Such ...
Part 6: Monitoring MechanismsInternational audienceDNS tunnels allow circumventing access and securi...
This paper surveys the problems, related to network traffic analysis to detect anomalies, particula...
Domain Name System (DNS) plays an important role as a translation protocol in everyday use of the I...
While originally not intended for data transfer, the Domain Name System (DNS) is currently used to t...
While originally not intended for data transfer, the Domain Name System (DNS) is currently used to t...
This thesis describes the design and implementation of system for effective detection of network ano...
DNS tunneling is a typical attack adopted by cyber-criminals to compromise victims' devices,steal se...
DNS tunneling is a typical attack adopted by cyber-criminals to compromise victims' devices,steal se...
DNS tunneling is a typical attack adopted by cyber-criminals to compromise victims' devices,steal se...
DNS tunneling is a typical attack adopted by cyber-criminals to compromise victims' devices,steal se...
Application-layer tunnels nowadays represent a significant security threat for any network protected...
DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security...
DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security...
DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security...
Abstract. DNS tunnels allow circumventing access and security policies in firewalled networks. Such ...
Part 6: Monitoring MechanismsInternational audienceDNS tunnels allow circumventing access and securi...
This paper surveys the problems, related to network traffic analysis to detect anomalies, particula...
Domain Name System (DNS) plays an important role as a translation protocol in everyday use of the I...
While originally not intended for data transfer, the Domain Name System (DNS) is currently used to t...
While originally not intended for data transfer, the Domain Name System (DNS) is currently used to t...
This thesis describes the design and implementation of system for effective detection of network ano...
DNS tunneling is a typical attack adopted by cyber-criminals to compromise victims' devices,steal se...
DNS tunneling is a typical attack adopted by cyber-criminals to compromise victims' devices,steal se...
DNS tunneling is a typical attack adopted by cyber-criminals to compromise victims' devices,steal se...
DNS tunneling is a typical attack adopted by cyber-criminals to compromise victims' devices,steal se...
Application-layer tunnels nowadays represent a significant security threat for any network protected...