Network Steganography in the DNS Protocol

Michał Drzymała , Krzysztof Szczypiorski , Marek Łukasz Urbański

Abstract

This paper presents possibility of using of the DNS (Domain Name System) protocol for creating a simplex communication channel between a malware-infected computer with a compromised DNS server. The proposed channel can be used to steal data or confidential enterprise information secretly.
Author Michał Drzymała WEiTI
Michał Drzymała,,
- Faculty of Electronics and Information Technology
, Krzysztof Szczypiorski IT
Krzysztof Szczypiorski,,
- The Institute of Telecommunications
, Marek Łukasz Urbański WEiTI
Marek Łukasz Urbański,,
- Faculty of Electronics and Information Technology
Journal seriesInternational Journal of Electronics and Telecommunications, ISSN 2081-8491, e-ISSN 2300-1933 [0867-6747]
Issue year2016
Vol62
No4
Pages343-346
Publication size in sheets0.5
Keywords in EnglishDNS, network steganography, malware
DOIDOI:10.1515/eletel-2016-0047
projectThe Develpment of Digital Communicatios. Project leader: Siuzdak Jerzy, , Phone: +48 22 234-7232, start date 27-04-2015, end date 31-12-2016, IT/2015/statut, Completed
WEiTI Działalność statutowa
Languageen angielski
Score (nominal)15
ScoreMinisterial score = 15.0, 27-03-2017, ArticleFromJournal
Ministerial score (2013-2016) = 15.0, 27-03-2017, ArticleFromJournal
Citation count*0
Cite
Share Share



* presented citation count is obtained through Internet information analysis and it is close to the number calculated by the Publish or Perish system.
Back