Harm Schotanus

Learn More
DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security breach can be misused for activities like free web browsing, but also for command & control traffic or cyber espionage, thus motivating the search for effective automated DNS tunnel detection techniques. In this paper we develop such a technique, based on(More)
– IPv6 deployment has been steadily increasing over the past couple of years. In order to enable a safe and secure deployment of IPv6 the security impact of implementation problems requires the same attention as in IPv4. It is therefore important to be able to correctly assess if such problems are present, this is an activity that is usually performed(More)
  • 1