A Review on Network Covert Channel Construction and Attack Detection

MA Khadse, DM Dakhane - Concurrency and Computation …, 2025 - Wiley Online Library
ABSTRACT A covert network channel is a communication channel in which the message is
secretly transmitted to the recipient. Sometimes, covert network channels are vulnerable to …

Covert channel detection: machine learning approaches

MA Elsadig, A Gafar - IEEE Access, 2022 - ieeexplore.ieee.org
The advanced development of computer networks and communication technologies has
made covert communications easier to construct, faster, undetectable and more secure than …

FECC: DNS tunnel detection model based on CNN and clustering

J Liang, S Wang, S Zhao, S Chen - Computers & Security, 2023 - Elsevier
As the basic service of the network, the Domain Name System (DNS) is almost never
blocked by the firewall. DNS tunnel takes advantage of this feature of DNS service to …

DNS tunneling detection by cache-property-aware features

N Ishikura, D Kondo, V Vassiliades… - … on Network and …, 2021 - ieeexplore.ieee.org
Many enterprises are under threat of targeted attacks aiming at data exfiltration. To launch
such attacks, in recent years, attackers with their malware have exploited a covert channel …

Real-time detection system for data exfiltration over DNS tunneling using machine learning

O Abualghanam, H Alazzam, B Elshqeirat… - Electronics, 2023 - mdpi.com
The domain name system (DNS) plays a vital role in network services for name resolution.
By default, this service is seldom blocked by security solutions. Thus, it has been exploited …

DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour

K Žiža, P Tadić, P Vuletić - International Journal of Information Security, 2023 - Springer
Abstract The Domain Name System (DNS) exfiltration is an activity in which an infected
device sends data to the attacker's server by encoding it in DNS request messages …

[PDF][PDF] Information based heavy hitters for real-time DNS data exfiltration detection

Y Ozery, A Nadler, A Shabtai - Proc. Netw. Distrib. Syst. Secur …, 2024 - ndss-symposium.org
Data exfiltration over the DNS protocol and its detection have been researched extensively
in recent years. Prior studies focused on offline detection methods, which although capable …

An ensemble framework for detection of DNS-Over-HTTPS (DOH) traffic

A Aggarwal, M Kumar - Multimedia Tools and Applications, 2024 - Springer
Abstract Domain Name System (DNS) is a fundamental protocol and backbone of the
internet that translates domain names to Internet Protocol (IP) addresses. Initially, it was only …

Map** tools for open source intelligence with cyber kill chain for adversarial aware security

MM Yamin, M Ullah, H Ullah, B Katt, M Hijji… - Mathematics, 2022 - mdpi.com
Open-source intelligence (OSINT) tools are used for gathering information using different
publicly available sources. With the rapid advancement in information technology and …

Encrypt DNS traffic: Automated feature learning method for detecting DNS tunnels

S Ding, D Zhang, J Ge, X Yuan… - 2021 IEEE Intl Conf on …, 2021 - ieeexplore.ieee.org
In recent years, attacks on the DNS continue to proliferate due to the lack of security
mechanisms. DNS over HTTPS (DoH) is a standard developed for encrypting plaintext DNS …