DNS and Data Exfiltration Detection
dc.contributor.author | Sung, Nicole | |
dc.date.accessioned | 2021-12-22T20:28:53Z | |
dc.date.available | 2021-12-22T20:28:53Z | |
dc.date.issued | 2021-11 | |
dc.description | A student presentation to the Fall 2021 Student Research and Creative Works Symposium | |
dc.description.abstract | Undetected data exfiltration is a common occurrence<br> There is little research into detecting the data as it is traveling from target to attacker <br> Most research is on the prevention of exploitation. <br> Fundamental internet protocols are being used for exfiltration<br> DNS is the internet address book, so almost all internet-connected devices accept it <br> Most tunnels are encrypted to bypass packet inspection <br> By understanding how these protocols work, IDS rules can be developed to alert when traffic is abnormal | |
dc.format.extent | 1 page | |
dc.identifier.uri | http://hdl.handle.net/10790/6834 | |
dc.language.iso | English | |
dc.publisher | University of Hawaiʻi — West Oʻahu | |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 United States | |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | |
dc.title | DNS and Data Exfiltration Detection | |
dc.type | Presentation | |
dc.type.dcmi | text |
Files
Original bundle
1 - 1 of 1