DNS and Data Exfiltration Detection

dc.contributor.authorSung, Nicole
dc.date.accessioned2021-12-22T20:28:53Z
dc.date.available2021-12-22T20:28:53Z
dc.date.issued2021-11
dc.descriptionA student presentation to the Fall 2021 Student Research and Creative Works Symposium
dc.description.abstractUndetected data exfiltration is a common occurrence<br> There is little research into detecting the data as it is traveling from target to attacker <br> Most research is on the prevention of exploitation. <br> Fundamental internet protocols are being used for exfiltration<br> DNS is the internet address book, so almost all internet-connected devices accept it <br> Most tunnels are encrypted to bypass packet inspection <br> By understanding how these protocols work, IDS rules can be developed to alert when traffic is abnormal
dc.format.extent1 page
dc.identifier.urihttp://hdl.handle.net/10790/6834
dc.language.isoEnglish
dc.publisherUniversity of Hawaiʻi — West Oʻahu
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 United States
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/
dc.titleDNS and Data Exfiltration Detection
dc.typePresentation
dc.type.dcmitext

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
ssym-fall2021-0021.pdf
Size:
277.29 KB
Format:
Adobe Portable Document Format