Network Steganography in the DNS Protocol
Journal Title: International Journal of Electronics and Telecommunications - Year 2016, Vol 62, Issue 4
Abstract
This paper presents possibility of using of the DNS (Domain Name System) protocol for creating a simplex communication channel between a malware-infected computer with a compromised DNS server. The proposed channel can be used to steal data or confidential enterprise information secretly
Authors and Affiliations
Michał Drzymała, Krzysztof Szczypiorski, Marek Łukasz Urbański
An Experimental Study of Conducted EMI Mitigation on the LED Driver using Spread Spectrum Technique
LED driver has the potential to interfere the system of electronic devices if the voltage and current change rapidly. Several previous studies presented various solutions to overcome this problem such as particular conv...
The Idea of Enhancing Directional Energy Radiation by a Phased Antenna Array in UHF RFID System
The interrogation zone IZ is the most important parameter when RFID systems are considered. Its predictability is determined by the construction and parameters of antenna built in a read/write device. The IZ should be of...
On Definition of Operator o for Weakly Nonlinear Circuits
For the first time, operator o appeared in the literature on weakly nonlinear circuits in a Narayanan’s paper on modelling transistor nonlinear distortion with the use of Volterra series. Its definition was restricted on...
Quadrature Mapping, Saleh’s Representation, and Memory Models
In the literature, Saleh’s description of the AM/AM and AM/PM conversions occurring in communication power amplifiers (PAs) is classified as a representation without memory. We show here that this view must be revised. T...
Time interval measurement module implemented in SoC FPGA device
We presents the design and test results of a picosecond-precision time interval measurement module, integrated as a System-on-Chip in an FPGA device. Implementing a complete measurement instrument of a high precision in...