Real-time detection system for data exfiltration over DNS tunneling using machine learning
The domain name system (DNS) plays a vital role in network services for name resolution.
By default, this service is seldom blocked by security solutions. Thus, it has been exploited …
By default, this service is seldom blocked by security solutions. Thus, it has been exploited …
[PDF][PDF] Information based heavy hitters for real-time DNS data exfiltration detection
Data exfiltration over the DNS protocol and its detection have been researched extensively
in recent years. Prior studies focused on offline detection methods, which although capable …
in recent years. Prior studies focused on offline detection methods, which although capable …
[PDF][PDF] A Comprehensive Review of DNS-based Distributed Reflection Denial of Service (DRDoS) Attacks: State-of-the-Art
RR Nuiaa, S Manickam… - Int. J. Adv. Sci. Eng. Inf …, 2022 - researchgate.net
Cyberattacks significantly impact the services based on the internet that is used in our daily
lives. Any disruption will make it extremely difficult for us to carry out our daily activities …
lives. Any disruption will make it extremely difficult for us to carry out our daily activities …
Diffusion of white-hat botnet using lifespan with controllable ripple effect for malware removal in IoT networks
MA Bin Ahmadon, S Yamaguchi - Sensors, 2023 - mdpi.com
Self-propagating malware has been infecting thousands of IoT devices and causing security
breaches worldwide. Mitigating and cleaning self-propagating malware is important but …
breaches worldwide. Mitigating and cleaning self-propagating malware is important but …
Information-Based Heavy Hitters for Real-Time DNS Data Exfiltration Detection and Prevention
Data exfiltration over the DNS protocol and its detection have been researched extensively
in recent years. Prior studies focused on offline detection methods, which although capable …
in recent years. Prior studies focused on offline detection methods, which although capable …
[PDF][PDF] ANFIS-AMAL: Android Malware Threat Assessment Using Ensemble of ANFIS and GWO
The Android malware has various features and capabilities. Various malware has distinctive
characteristics. Ransomware threatens financial loss and system lockdown. This paper …
characteristics. Ransomware threatens financial loss and system lockdown. This paper …
Search for Articles
In this study, we suggest an interpretable fuzzy system for the classification of malicious
domains. The proposed system is integration of Sugeno type fuzzy system and projection …
domains. The proposed system is integration of Sugeno type fuzzy system and projection …
A Long Short Term Memory Model for Character-based Analysis of DNS Tunneling Detection
HK Tayyeh, ASA AL-Jumaili - Scalable Computing: Practice and …, 2024 - scpe.org
DNS tunneling is the attempt to create a hidden tunnel through a domain name service.
Such a tunnel would jeopardize the targeted network and open the door for illegal access …
Such a tunnel would jeopardize the targeted network and open the door for illegal access …
An Approach for Investigating DNS Threats Prevention's Methods and Enhancing Awareness of DNS Security: Towards Establishing a Practical Framework
A AlBalawi, B Alshehri, A Alanazi, M Albarqi, N Aljohani… - 2023 - search.proquest.com
Currently, addressing DNS systems has become a daily activity for many people. People's
reliance on DNS systems has attracted attention for DNS cybersecurity threats. In this paper …
reliance on DNS systems has attracted attention for DNS cybersecurity threats. In this paper …
[PDF][PDF] The Case for Real Time DNS Exfiltration Detection and Prevention
Y Ozery - botconf.eu
The Case for Real Time DNS Exfiltration Detection and Prevention Page 1 The Case for
Real Time DNS Exfiltration Detection and Prevention By: Yarin Ozery yozery@akamai.com …
Real Time DNS Exfiltration Detection and Prevention By: Yarin Ozery yozery@akamai.com …