Paul A. Hanke

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
This paper describes an approach for detecting the presence of domain name system (DNS) tunnels in network traffic. DNS tunneling is a common technique hackers use to establish command and control nodes and to exfiltrate data from networks. To generate the training data sufficient to build models to detect DNS tunneling activity, a penetration testing(More)
  • 1