Please use this identifier to cite or link to this item:
http://hdl.handle.net/10790/6834
DNS and Data Exfiltration Detection
File | Size | Format | ||
---|---|---|---|---|
ssym-fall2021-0021.pdf | 277.29 kB | Adobe PDF | View/Open |
Item Summary
Title: | DNS and Data Exfiltration Detection |
Authors: | Sung, Nicole |
Date Issued: | Nov 2021 |
Publisher: | University of Hawaiʻi — West Oʻahu |
Abstract: | Undetected data exfiltration is a common occurrence There is little research into detecting the data as it is traveling from target to attacker Most research is on the prevention of exploitation. Fundamental internet protocols are being used for exfiltration DNS is the internet address book, so almost all internet-connected devices accept it Most tunnels are encrypted to bypass packet inspection By understanding how these protocols work, IDS rules can be developed to alert when traffic is abnormal |
Description: | A student presentation to the Fall 2021 Student Research and Creative Works Symposium |
Pages/Duration: | 1 page |
URI: | http://hdl.handle.net/10790/6834 |
Rights: | Attribution-NonCommercial-NoDerivs 3.0 United States http://creativecommons.org/licenses/by-nc-nd/3.0/us/ |
Appears in Collections: |
Student Research Symposium |
Please email libraryada-l@lists.hawaii.edu if you need this content in ADA-compliant format.
This item is licensed under a Creative Commons License