Paul A. Hanke

Learn More
This paper describes an approach for detecting the presence of domain name system (DNS) tunnels in network traffic. DNS tunneling is a common technique hackers use to establish command and control nodes and to exfiltrate data from networks. To generate the training data sufficient to build models to detect DNS tunneling activity, a penetration testing(More)
atellite communications (SATCOM) planning, monitoring, and controlling systems developed in the late 1970s and 1980s were predominantly stand-alone “stove-piped” software. Most used nonstandardized data models and databases and had custom interfaces for data input/output. Often, the semantics, units, or format of the data differed between systems. Data(More)
  • 1