2013
DOI: 10.1007/978-3-642-37682-5_6
|View full text |Cite
|
Sign up to set email alerts
|

DNS Tunneling for Network Penetration

Abstract: Abstract. Most networks are connected to the Internet through firewalls to block attacks from the outside and to limit communication initiated from the inside. Because of the limited, supposedly safe functionality of the Domain Name System protocol, its traffic is by and large neglected by firewalls. The resulting possibility for setting up information channels through DNS tunnels is already known, but all existing implementations require help from insiders to set up the tunnels. This paper presents a new Meta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…In fact, their proposed methods are already used by some malware families such as Feederbot and Morto [11], [15]. Similarly, Raman et al [18] propose a network penetration technique that uses DNS tunneling to infiltrate a secure network to deliver an attack payload. Their technique is based on establishing a tunnel by an exploit code that generates DNS queries.…”
Section: Related Workmentioning
confidence: 98%
“…In fact, their proposed methods are already used by some malware families such as Feederbot and Morto [11], [15]. Similarly, Raman et al [18] propose a network penetration technique that uses DNS tunneling to infiltrate a secure network to deliver an attack payload. Their technique is based on establishing a tunnel by an exploit code that generates DNS queries.…”
Section: Related Workmentioning
confidence: 98%
“…Some researchers [29]- [31] have evaluated the performance (e.g., throughput) of DNS tunneling tools such as iodine [32] and dns2tcp [33]. Raman et al [34] proposed a DNS tunneling method and measured the maximal throughput.…”
Section: A Dns Tunneling Basicsmentioning
confidence: 99%
“…In the context of computer networks, a tunneling protocol is a communication protocol architecture adopted to communicate through an hidden way. It is one of the major threats affecting networks security, as it can lead to the exfiltration of sensitive data [13], [68]. Tunneling is adopted to achieve different purposes, usually either to exfiltrate data to the outside of the organization (as implementation of a covert channel) or to bypass network restrictions deployed by the organization.…”
Section: Tunnel System Architecturementioning
confidence: 99%