Stream-wise detection of surreptitious traffic over DNS

@article{Cejka2014StreamwiseDO,
  title={Stream-wise detection of surreptitious traffic over DNS},
  author={Tom{\'a}s Cejka and Zdenek Rosa and Hana Kubatova},
  journal={2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)},
  year={2014},
  pages={300-304}
}
The Domain Name System (DNS) belongs to crucial services in a computer network. Because of its importance, DNS is usually allowed in security policies. That opens a way to break policies and to transfer data from/to restricted area due to misusage of a DNS infrastructure. This paper is focused on a detection of communication tunnels and other anomalies in a DNS traffic. The proposed detection module is designed to process huge volume of data and to detect anomalies at near real-time. It is… CONTINUE READING

Citations

Publications citing this paper.

References

Publications referenced by this paper.
Showing 1-10 of 13 references

Detecting DNS Tunneling

  • G. Farnham
  • 2013. [Online]. Available: http://www.sans.org…
  • 2013
2 Excerpts

Nemea: Framework for stream-wise analysis of network traffic

  • V. Barto, et. al.
  • CESNET, a.l.e., Tech. Rep., 2013. [Online…
  • 2013
2 Excerpts

Iodine, tunnel IPv4 over DNS

  • E. Ekman, et. al.
  • 2011. [Online]. Available: http://code.kryo.se…
  • 2011
1 Excerpt

Domain names - implementation and specification

  • ——
  • RFC 1035 (Standard), Internet Engineering Task…
  • 1987
1 Excerpt

Similar Papers

Loading similar papers…