Matches in SemOpenAlex for { <https://semopenalex.org/work/W4230691962> ?p ?o ?g. }
Showing items 1 to 52 of
52
with 100 items per page.
- W4230691962 endingPage "194" @default.
- W4230691962 startingPage "187" @default.
- W4230691962 abstract "Chapter 10 Attacker Exploitation of DNS First published: 14 July 2017 https://doi.org/10.1002/9781119328292.ch10 AboutPDFPDF ToolsRequest permissionExport citationAdd to favoritesTrack citation ShareShareShare a linkShare onFacebookTwitterLinked InRedditWechat Abstract Major vulnerabilities exposed by the necessary free flowing of DNS traffic fall into two main categories: network reconnaissance and tunneling. An attacker may attempt to issue an ANY query to retrieve all resource records for a given domain name within the zone. Periodically review network activity logs to determine if any suspicious traffic subsequently originated from the query source's IP address. Data exfiltration may be accomplished by either using DNS as the data exfiltration transport protocol or by using DNS to locate an Internet destination to which to exfiltrate data or both. This chapter considers the former case. Methods for detection of DNS tunneling include the examination of DNS payload and of DNS transactions. These methods can also be applied to detecting queries to random domains using dynamically generated algorithms (DGAs) commonly used for malware detection evasion. DNS Security Management, First Edition RelatedInformation" @default.
- W4230691962 created "2022-05-11" @default.
- W4230691962 date "2017-07-14" @default.
- W4230691962 modified "2023-10-12" @default.
- W4230691962 title "Attacker Exploitation of DNS" @default.
- W4230691962 doi "https://doi.org/10.1002/9781119328292.ch10" @default.
- W4230691962 hasPublicationYear "2017" @default.
- W4230691962 type Work @default.
- W4230691962 citedByCount "0" @default.
- W4230691962 crossrefType "other" @default.
- W4230691962 hasConcept C102359118 @default.
- W4230691962 hasConcept C110875604 @default.
- W4230691962 hasConcept C134066672 @default.
- W4230691962 hasConcept C136764020 @default.
- W4230691962 hasConcept C158379750 @default.
- W4230691962 hasConcept C182590292 @default.
- W4230691962 hasConcept C22735295 @default.
- W4230691962 hasConcept C31258907 @default.
- W4230691962 hasConcept C35026560 @default.
- W4230691962 hasConcept C38652104 @default.
- W4230691962 hasConcept C41008148 @default.
- W4230691962 hasConcept C541664917 @default.
- W4230691962 hasConceptScore W4230691962C102359118 @default.
- W4230691962 hasConceptScore W4230691962C110875604 @default.
- W4230691962 hasConceptScore W4230691962C134066672 @default.
- W4230691962 hasConceptScore W4230691962C136764020 @default.
- W4230691962 hasConceptScore W4230691962C158379750 @default.
- W4230691962 hasConceptScore W4230691962C182590292 @default.
- W4230691962 hasConceptScore W4230691962C22735295 @default.
- W4230691962 hasConceptScore W4230691962C31258907 @default.
- W4230691962 hasConceptScore W4230691962C35026560 @default.
- W4230691962 hasConceptScore W4230691962C38652104 @default.
- W4230691962 hasConceptScore W4230691962C41008148 @default.
- W4230691962 hasConceptScore W4230691962C541664917 @default.
- W4230691962 hasLocation W42306919621 @default.
- W4230691962 hasOpenAccess W4230691962 @default.
- W4230691962 hasPrimaryLocation W42306919621 @default.
- W4230691962 hasRelatedWork W1542874264 @default.
- W4230691962 hasRelatedWork W1996006176 @default.
- W4230691962 hasRelatedWork W2073523380 @default.
- W4230691962 hasRelatedWork W2384391311 @default.
- W4230691962 hasRelatedWork W2543487408 @default.
- W4230691962 hasRelatedWork W2733931179 @default.
- W4230691962 hasRelatedWork W2929621094 @default.
- W4230691962 hasRelatedWork W4285325964 @default.
- W4230691962 hasRelatedWork W4299443900 @default.
- W4230691962 hasRelatedWork W1642214788 @default.
- W4230691962 isParatext "false" @default.
- W4230691962 isRetracted "false" @default.
- W4230691962 workType "other" @default.