↧
DNS Covert Channel Attacks: Detecting Anomalies
DNS Covert Channel Attacks: Detecting Anomalies Part 3 of 5 In part 1 of this series, I introduced the idea of detecting and blocking data being exfiltrated or infiltrated using the DNS protocol. Part...
View ArticleDNS Covert Channel Attacks: Anomaly Occurrence
DNS Covert Channel Attacks: Anomaly Occurrence Part 4 of 5 In the prior articles of this series (1, 2, 3), I introduced and expanded on the idea of detection of data being exfiltrated or infiltrated...
View Article