DNS and Data Exfiltration Detection

Date

2021-11

Contributor

Advisor

Department

Instructor

Depositor

Speaker

Researcher

Consultant

Interviewer

Narrator

Transcriber

Annotator

Journal Title

Journal ISSN

Volume Title

Publisher

University of Hawaiʻi — West Oʻahu

Volume

Number/Issue

Starting Page

Ending Page

Alternative Title

Abstract

Undetected data exfiltration is a common occurrence
There is little research into detecting the data as it is traveling from target to attacker
Most research is on the prevention of exploitation.
Fundamental internet protocols are being used for exfiltration
DNS is the internet address book, so almost all internet-connected devices accept it
Most tunnels are encrypted to bypass packet inspection
By understanding how these protocols work, IDS rules can be developed to alert when traffic is abnormal

Description

A student presentation to the Fall 2021 Student Research and Creative Works Symposium

Keywords

Citation

Extent

1 page

Format

Geographic Location

Time Period

Related To

Related To (URI)

Table of Contents

Rights

Attribution-NonCommercial-NoDerivs 3.0 United States

Rights Holder

Local Contexts

Email libraryada-l@lists.hawaii.edu if you need this content in ADA-compliant format.