【24h】

DNSxD: Detecting Data Exfiltration Over DNS

机译:DNSxD:检测DNS上的数据泄漏

获取原文

摘要

According to a 2017 SANS report, 1 in 20 organisations fall victim to data exfiltration. Data exfiltration, often the final stage of a cyber attack has damaging consequences for the victim organisation. The use of the Domain Name System (DNS) protocol for data exfiltration was first discussed in 1998. Twenty years on, this covert transmission method has become more sophisticated as malicious actors adapt to evade detection techniques. The popularity of DNS for data exfiltration is due to the essential nature of the protocol for network communication. This paper addresses the issue of DNS-based data exfiltration proposing a detection and mitigation method leveraging the Software-Defined Network (SDN) architecture. Popular DNS data exfiltration attacks and current exfiltration detection mechanisms are analysed to generate a feature-set for DNS data exfiltration detection. The DNSxD application is presented and its performance evaluated in comparison with the current exfiltration detection mechanisms.
机译:根据2017年SANS的报告,每20个组织中就有1个遭受数据泄露的影响。数据泄露,通常是网络攻击的最后阶段,会对受害者组织造成破坏性后果。在1998年首次讨论了使用域名系统(DNS)协议进行数据泄露。二十年来,随着恶意行为者适应逃避检测技术,这种秘密传输方法变得更加复杂。 DNS用于数据渗透的普及是由于网络通信协议的本质。本文解决了基于DNS的数据泄露问题,提出了一种利用软件定义网络(SDN)架构的检测和缓解方法。分析了流行的DNS数据渗透攻击和当前的渗透检测机制,以生成用于DNS数据渗透检测的功能集。提出了DNSxD应用程序,并与当前的渗透检测机制进行了比较,评估了其性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号