首页> 外文会议>Internet of things, smart spaces, and next generation networks and systems >DNS Tunneling Detection Techniques - Classification, and Theoretical Comparison in Case of a Real APT Campaign
【24h】

DNS Tunneling Detection Techniques - Classification, and Theoretical Comparison in Case of a Real APT Campaign

机译:DNS隧道检测技术-分类和在实际APT活动中的理论比较

获取原文
获取原文并翻译 | 示例

摘要

Domain Name System (DNS) plays an important role as a translation protocol in everyday use of the Internet. The purpose of DNS is to translate domain names into IP addresses and vice versa. However, its simple architecture can easily be misused for malicious activities. One huge security threat concerning DNS is tunneling, which helps attackers bypass the security systems unnoticed. A DNS tunnel can be used for three purposes: as a command and control channel, for data exfiltration or even for tunneling another protocol through it. In this paper, we surveyed different techniques for DNS tunneling detection. We classified those first based on the type of data and then within the categories based on the type of analysis. We conclude with a comparison between the various detection techniques. We introduce one real Advanced Persistent Threat campaign that utilizes DNS tunneling, and theoretically compare how well the surveyed detection techniques could detect it.
机译:域名系统(DNS)在互联网的日常使用中作为翻译协议发挥着重要作用。 DNS的目的是将域名转换为IP地址,反之亦然。但是,其简单的体系结构很容易被滥用用于恶意活动。与DNS有关的一项巨大安全威胁是隧道传输,它可以帮助攻击者绕过安全系统而不会被察觉。 DNS隧道可用于三个目的:作为命令和控制通道,数据渗透或什至通过该隧道建立另一个协议。在本文中,我们调查了DNS隧道检测的不同技术。我们首先根据数据类型对数据进行分类,然后根据分析类型对数据进行分类。我们以各种检测技术之间的比较作为结束。我们介绍了一个利用DNS隧道进行的真正的“高级持久威胁”活动,并从理论上比较了所调查的检测技术可以对其进行检测的程度。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号