Search results for "Domain name"

showing 5 items of 5 documents

DNS Tunneling Detection Techniques – Classification, and Theoretical Comparison in Case of a Real APT Campaign

2017

Domain Name System (DNS) plays an important role as a translation protocol in everyday use of the Internet. The purpose of DNS is to translate domain names into IP addresses and vice versa. However, its simple architecture can easily be misused for malicious activities. One huge security threat concerning DNS is tunneling, which helps attackers bypass the security systems unnoticed. A DNS tunnel can be used for three purposes: as a command and control channel, for data exfiltration or even for tunneling another protocol through it. In this paper, we surveyed different techniques for DNS tunneling detection. We classified those first based on the type of data and then within the categories b…

DNS tunneling detectionSIMPLE (military communications protocol)business.industryComputer scienceDomain Name SystemComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreDomain (software engineering)protokollat0202 electrical engineering electronic engineering information engineeringAPT020201 artificial intelligence & image processingThe Internetcovert channels detectiontietoturvabusinesscomputerProtocol (object-oriented programming)
researchProduct

A secret sharing scheme for anonymous DNS queries

2013

Since its adoption in the early 90's, several privacy concerns have emerged about the Domain Name System (DNS). By collecting the DNS queries performed by each user, it is possible to characterize habits, interests and other sensitive data of the users. Usually, users resolve their {\em url} requests by querying the DSN server belonging to their Internet Service Provider (ISP) and therefore they assume they can trust it. However, different DNS servers can be used, by revealing sensitive data to a partially untrusted entity that can collect and sell this data for several purposes (target advertising, user profiling, etc.). In this paper we address the possibility to integrate tools in the cu…

Name serverInformation privacyComputer scienceRound-robin DNSecret sharing schemeOverlay networkServersServernsupdateISPDNS spoofingPeer-to-peer computingDNS hijackingdomain name systemInternetdata privacyender anonymitybusiness.industrySettore ING-INF/03 - TelecomunicazioniDomain Name Systemquery processinguser privacyComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSmultiple nodeIP networkInternet service provideranonymous DNS queryPrivacyecurity of dataCryptographybusinessComputer networkDSN serverRadiation detector
researchProduct

Domain Generation Algorithm Detection Using Machine Learning Methods

2018

A botnet is a network of private computers infected with malicious software and controlled as a group without the knowledge of the owners. Botnets are used by cybercriminals for various malicious activities, such as stealing sensitive data, sending spam, launching Distributed Denial of Service (DDoS) attacks, etc. A Command and Control (C&C) server sends commands to the compromised hosts to execute those malicious activities. In order to avoid detection, recent botnets such as Conficker, Zeus, and Cryptolocker apply a technique called Domain-Fluxing or Domain Name Generation Algorithms (DGA), in which the infected bot periodically generates and tries to resolve a large number of pseudorando…

Pseudorandom number generatorDomain generation algorithmAlphanumericComputer sciencebusiness.industryDomain Name SystemComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSBotnetDenial-of-service attackMachine learningcomputer.software_genreComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSCryptoLockerMalwareArtificial intelligencebusinesscomputer
researchProduct

Editorial issue 2

2018

It has been a very long trip since I wrote my last editorial. The first issue of the Journal received a strong welcome from all over the world in the beginning of 2016, but there was something missing that drove us to a winding road that ended in an even stronger situation: the support of the University of Valencia’s Publication Service (UVPS). The missing thing in the first issue was the DOI (Digital Object Identifier). All the online journals have a DOI to identify the papers and allow a permanent link to them. Each DOI is unique for each paper. We look for a DOI provider in our environment and found the UVPS to offer DOIs for free to their teachers. As I am one of them, I went to ask for…

Service (business)Impact factorbusiness.industrymedia_common.quotation_subjectLibrary sciencePatienceUploadDomain namePolitical scienceDigital Object IdentifierbusinessPublicationmedia_commonWeb siteJournal of Ozone Therapy
researchProduct

Trademarks and Cyberspace

2006

Trademark law aids consumers who use trademarks in the marketplace to identify swiftly and without problems a product they liked or disliked in the past, distinguishing among the different competing manufacturers of a product. No one is entitled to sell or deliver commodities under the appearance that the commodities derive from someone else. The importance of consumer protection cannot be over-emphasized and the average consumer standard should remain the central point of the inquiry, even under domain name litigation. Replacing the initial interest confusion doctrine is one decisive step, along with the introduction of a doctrine representing the fact that there should be no confusion at …

Trademarkmedia_common.quotation_subjectDoctrineComputingMilieux_LEGALASPECTSOFCOMPUTINGAdvertisingConsumer protectionDiscount pointsProduct (business)Domain nameInitial Interest ConfusionBusinessCyberspaceLawmedia_commonThe Journal of World Intellectual Property
researchProduct