首页> 外文OA文献 >DNS Tunneling Detection Techniques – Classification, and Theoretical Comparison in Case of a Real APT Campaign
【2h】

DNS Tunneling Detection Techniques – Classification, and Theoretical Comparison in Case of a Real APT Campaign

机译:DNS隧道检测技术–真实APT活动中的分类和理论比较

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Domain Name System (DNS) plays an important role as a translationprotocol in everyday use of the Internet. The purpose of DNS is to translate domainnames into IP addresses and vice versa. However, its simple architecturecan easily be misused for malicious activities. One huge security threat concerningDNS is tunneling, which helps attackers bypass the security systems unnoticed.A DNS tunnel can be used for three purposes: as a command and controlchannel, for data exfiltration or even for tunneling another protocol through it. Inthis paper, we surveyed different techniques for DNS tunneling detection. Weclassified those first based on the type of data and then within the categories basedon the type of analysis. We conclude with a comparison between the various detectiontechniques. We introduce one real Advanced Persistent Threat campaignthat utilizes DNS tunneling, and theoretically compare how well the surveyeddetection techniques could detect it.
机译:域名系统(DNS)在互联网的日常使用中起着翻译协议的重要作用。 DNS的目的是将域名转换为IP地址,反之亦然。但是,其简单的体系结构很容易被滥用用于恶意活动。涉及DNS的一项巨大安全威胁是隧道,它可以帮助攻击者绕过安全系统而未被注意到.DNS隧道可用于三个目的:作为命令和控制通道,数据渗透甚至通过它隧道传输其他协议。在本文中,我们调查了DNS隧道检测的不同技术。我们首先根据数据类型对分类,然后根据分析类型对分类。我们通过比较各种检测技术来得出结论。我们介绍了一个利用DNS隧道进行的真正的“高级持久威胁”活动,并从理论上比较了被调查的检测技术可以很好地检测到它。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号