Näytä suppeat kuvailutiedot

dc.contributor.authorNuojua, Viivi
dc.contributor.authorDavid, Gil
dc.contributor.authorHämäläinen, Timo
dc.contributor.editorGalinina, Olga
dc.contributor.editorAndreev, Sergey
dc.contributor.editorBalandin, Sergey
dc.contributor.editorKoucheryavy, Yevgeni
dc.date.accessioned2017-10-31T12:29:47Z
dc.date.available2018-09-13T21:35:40Z
dc.date.issued2017
dc.identifier.citationNuojua, V., David, G., & Hämäläinen, T. (2017). DNS Tunneling Detection Techniques – Classification, and Theoretical Comparison in Case of a Real APT Campaign. In O. Galinina, S. Andreev, S. Balandin, & Y. Koucheryavy (Eds.), <i>NEW2AN 2017, ruSMART 2017, NsCC 2017 : Internet of Things, Smart Spaces, and Next Generation Networks and Systems</i> (pp. 280-291). Springer International Publishing. Lecture Notes in Computer Science, 10531. <a href="https://doi.org/10.1007/978-3-319-67380-6_26" target="_blank">https://doi.org/10.1007/978-3-319-67380-6_26</a>
dc.identifier.otherCONVID_27214789
dc.identifier.otherTUTKAID_74960
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/55746
dc.description.abstractDomain Name System (DNS) plays an important role as a translation protocol in everyday use of the Internet. The purpose of DNS is to translate domain names into IP addresses and vice versa. However, its simple architecture can easily be misused for malicious activities. One huge security threat concerning DNS is tunneling, which helps attackers bypass the security systems unnoticed. A DNS tunnel can be used for three purposes: as a command and control channel, for data exfiltration or even for tunneling another protocol through it. In this paper, we surveyed different techniques for DNS tunneling detection. We classified those first based on the type of data and then within the categories based on the type of analysis. We conclude with a comparison between the various detection techniques. We introduce one real Advanced Persistent Threat campaign that utilizes DNS tunneling, and theoretically compare how well the surveyed detection techniques could detect it.
dc.format.extent769
dc.language.isoeng
dc.publisherSpringer International Publishing
dc.relation.ispartofNEW2AN 2017, ruSMART 2017, NsCC 2017 : Internet of Things, Smart Spaces, and Next Generation Networks and Systems
dc.relation.ispartofseriesLecture Notes in Computer Science
dc.subject.otherDNS tunneling detection
dc.subject.othercovert channels detection
dc.subject.otherAPT
dc.titleDNS Tunneling Detection Techniques – Classification, and Theoretical Comparison in Case of a Real APT Campaign
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-201710304091
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietotekniikkafi
dc.contributor.oppiaineMathematical Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.date.updated2017-10-30T13:15:10Z
dc.relation.isbn978-3-319-67379-0
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange280-291
dc.relation.issn0302-9743
dc.type.versionacceptedVersion
dc.rights.copyright© Springer International Publishing AG 2017. This is a final draft version of an article whose final and definitive form has been published by Springer. Published in this repository with the kind permission of the publisher.
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceInternational Conference on Next Generation Wired/Wireless Advanced Networks and Systems
dc.subject.ysoprotokollat (tietoliikenne)
dc.subject.ysotietoturva
jyx.subject.urihttp://www.yso.fi/onto/yso/p9894
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
dc.relation.doi10.1007/978-3-319-67380-6_26
dc.type.okmA4


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot