Real-time detection system for data exfiltration over DNS tunneling using machine learning

O Abualghanam, H Alazzam, B Elshqeirat… - Electronics, 2023 - mdpi.com
The domain name system (DNS) plays a vital role in network services for name resolution.
By default, this service is seldom blocked by security solutions. Thus, it has been exploited …

[PDF][PDF] Information based heavy hitters for real-time DNS data exfiltration detection

Y Ozery, A Nadler, A Shabtai - Proc. Netw. Distrib. Syst. Secur …, 2024 - ndss-symposium.org
Data exfiltration over the DNS protocol and its detection have been researched extensively
in recent years. Prior studies focused on offline detection methods, which although capable …

[PDF][PDF] A Comprehensive Review of DNS-based Distributed Reflection Denial of Service (DRDoS) Attacks: State-of-the-Art

RR Nuiaa, S Manickam… - Int. J. Adv. Sci. Eng. Inf …, 2022 - researchgate.net
Cyberattacks significantly impact the services based on the internet that is used in our daily
lives. Any disruption will make it extremely difficult for us to carry out our daily activities …

Diffusion of white-hat botnet using lifespan with controllable ripple effect for malware removal in IoT networks

MA Bin Ahmadon, S Yamaguchi - Sensors, 2023 - mdpi.com
Self-propagating malware has been infecting thousands of IoT devices and causing security
breaches worldwide. Mitigating and cleaning self-propagating malware is important but …

Information-Based Heavy Hitters for Real-Time DNS Data Exfiltration Detection and Prevention

Y Ozery, A Nadler, A Shabtai - arXiv preprint arXiv:2307.02614, 2023 - arxiv.org
Data exfiltration over the DNS protocol and its detection have been researched extensively
in recent years. Prior studies focused on offline detection methods, which although capable …

[PDF][PDF] ANFIS-AMAL: Android Malware Threat Assessment Using Ensemble of ANFIS and GWO

N Nwasra, M Daoud, ZH Qaisar - Cybernetics and Information …, 2024 - sciendo.com
The Android malware has various features and capabilities. Various malware has distinctive
characteristics. Ransomware threatens financial loss and system lockdown. This paper …

Search for Articles

R Prasad, PK Shukla - 2023 - mecs-press.org
In this study, we suggest an interpretable fuzzy system for the classification of malicious
domains. The proposed system is integration of Sugeno type fuzzy system and projection …

A Long Short Term Memory Model for Character-based Analysis of DNS Tunneling Detection

HK Tayyeh, ASA AL-Jumaili - Scalable Computing: Practice and …, 2024 - scpe.org
DNS tunneling is the attempt to create a hidden tunnel through a domain name service.
Such a tunnel would jeopardize the targeted network and open the door for illegal access …

An Approach for Investigating DNS Threats Prevention's Methods and Enhancing Awareness of DNS Security: Towards Establishing a Practical Framework

A AlBalawi, B Alshehri, A Alanazi, M Albarqi, N Aljohani… - 2023 - search.proquest.com
Currently, addressing DNS systems has become a daily activity for many people. People's
reliance on DNS systems has attracted attention for DNS cybersecurity threats. In this paper …

[PDF][PDF] The Case for Real Time DNS Exfiltration Detection and Prevention

Y Ozery - botconf.eu
The Case for Real Time DNS Exfiltration Detection and Prevention Page 1 The Case for
Real Time DNS Exfiltration Detection and Prevention By: Yarin Ozery yozery@akamai.com …