Network Steganography in the DNS Protocol

Journal Title: International Journal of Electronics and Telecommunications - Year 2016, Vol 62, Issue 4

Abstract

This paper presents possibility of using of the DNS (Domain Name System) protocol for creating a simplex communication channel between a malware-infected computer with a compromised DNS server. The proposed channel can be used to steal data or confidential enterprise information secretly

Authors and Affiliations

Michał Drzymała, Krzysztof Szczypiorski, Marek Łukasz Urbański

Keywords

Related Articles

Advanced photonic and electronic systems WILGA 2016

Young Researchers Symposium WILGA on Photonics Applications and Web Engineering has been organized since 1998, two times a year. Subject area of the Wilga Symposium are advanced photonic and electronic systems in all asp...

Mathematical Model of Communication Delays in Wireless Networks

The paper presents a new conception of building probabilistic models of communication delays in wireless networks that basis on using a delta function sequence to describe retransmissions between a transmitter and a rece...

CBM Experiment Local and Global Implications

The research area of the compressed baryonic matter - CBM experiment (FAIR/GSI in Darmstadt) is sub-nuclear physics, thus hadron-baryon and quark-gluon, and the essence of phase transitions in the area of hot nuclear mat...

Operator o and analysis of harmonic distortion

It has been shown that the description of mildly nonlinear circuits with the use of an operator o introduced by Meyer and Stephens in their paper published more than forty years ago was flawed. The problem now with their...

Download PDF file
  • EP ID EP200759
  • DOI 10.1515/eletel-2016-0047
  • Views 86
  • Downloads 0

How To Cite

Michał Drzymała, Krzysztof Szczypiorski, Marek Łukasz Urbański (2016). Network Steganography in the DNS Protocol. International Journal of Electronics and Telecommunications, 62(4), 343-346. https://europub.co.uk/articles/-A-200759