Paul A. Hanke

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
This paper describes an approach for detecting the presence of domain name system (DNS) tunnels in network traffic. DNS tunneling is a common technique hackers use to establish command and control nodes and to exfiltrate data from networks. To generate the training data sufficient to build models to detect DNS tunneling activity, a penetration testing(More)
atellite communications (SATCOM) planning, monitoring, and controlling systems developed in the late 1970s and 1980s were predominantly stand-alone " stove-piped " software. Most used nonstandardized data models and databases and had custom interfaces for data input/output. Often, the semantics, units, or format of the data differed between systems. Data(More)
  • 1