Download PDFOpen PDF in browserData Exfiltration DetectionEasyChair Preprint 112954 pages•Date: November 15, 2023AbstractDespite the fact that DNS was first developed by Pavel Mockapetris in 1983 and hasn’t been significantly modified since, it still meets the exact requirements of RFC 882. Because packages span a few hosts, networks, and eventually the Internet, they also want to span a few administrations. Limits and associated operating methods (protocol and statistics format, etc.) combine with the number of sources (including mailboxes), the number of supported locations, and the diversity of these environments to create a consistent way to relate to precise sources that are comparable but scattered over the environment. If you want to motivate a powerful problem, Dan Kaminsky, a well-known DNS protection researcher, describes DNS as a globally deployed community that interconnects each private and non-private Internet. This causes extreme problems. Is DNS secure enough? Are you vulnerable to statistics breaches? The solution is that DNS can be used as a backdoor for hackers looking to steal sensitive statistic Keyphrases: DNS, Intrusion, data exfiltration, protocol
|