首页> 外文会议>International Conference on Next Generation Wired/Wireless Advanced Networks and Systems >DNS Tunneling Detection Techniques - Classification, and Theoretical Comparison in Case of a Real APT Campaign
【24h】

DNS Tunneling Detection Techniques - Classification, and Theoretical Comparison in Case of a Real APT Campaign

机译:DNS隧道检测技术 - 分类,以及真正的APT运动的理论比较

获取原文

摘要

Domain Name System (DNS) plays an important role as a translation protocol in everyday use of the Internet. The purpose of DNS is to translate domain names into IP addresses and vice versa. However, its simple architecture can easily be misused for malicious activities. One huge security threat concerning DNS is tunneling, which helps attackers bypass the security systems unnoticed. A DNS tunnel can be used for three purposes: as a command and control channel, for data exfiltration or even for tunneling another protocol through it. In this paper, we surveyed different techniques for DNS tunneling detection. We classified those first based on the type of data and then within the categories based on the type of analysis. We conclude with a comparison between the various detection techniques. We introduce one real Advanced Persistent Threat campaign that utilizes DNS tunneling, and theoretically compare how well the surveyed detection techniques could detect it.
机译:域名系统(DNS)在日常使用Internet中扮演重要角色。 DNS的目的是将域名转换为IP地址,反之亦然。但是,它的简单架构很容易被滥用恶意活动。关于DNS的一个巨大的安全威胁是隧道,这有助于攻击者绕过无意的安全系统。 DNS隧道可用于三种目的:作为命令和控制信道,用于数据exfiltration,甚至通过它隧道隧道隧道隧道隧道。在本文中,我们调查了DNS隧道检测的不同技术。我们首先根据数据类型分类,然后根据分析类型在类别中分类。我们在各种检测技术之间进行了比较。我们介绍了一个使用DNS隧道的一个真正的高级持久威胁活动,从理论上比较了调查的检测技术如何检测到它。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号