Network Steganography in the DNS Protocol

Michał Drzymała , Krzysztof Szczypiorski , Marek Łukasz Urbański

Abstract

This paper presents possibility of using of the DNS (Domain Name System) protocol for creating a simplex communication channel between a malware-infected computer with a compromised DNS server. The proposed channel can be used to steal data or confidential enterprise information secretly.
Author Michał Drzymała (FEIT)
Michał Drzymała,,
- Faculty of Electronics and Information Technology
, Krzysztof Szczypiorski (FEIT / IT)
Krzysztof Szczypiorski,,
- The Institute of Telecommunications
, Marek Łukasz Urbański (FEIT)
Marek Łukasz Urbański,,
- Faculty of Electronics and Information Technology
Journal seriesInternational Journal of Electronics and Telecommunications, [do 2009: Electronics and Telecommunications Quarterly], ISSN 2081-8491, e-ISSN 2300-1933, [0867-6747], (B 15 pkt)
Issue year2016
Vol62
No4
Pages343-346
Publication size in sheets0.5
Keywords in EnglishDNS, network steganography, malware
ASJC Classification2208 Electrical and Electronic Engineering; 1705 Computer Networks and Communications
DOIDOI:10.1515/eletel-2016-0047
ProjectThe Develpment of Digital Communicatios. Project leader: Siuzdak Jerzy, , Phone: +48 22 234-7868, start date 27-04-2015, end date 31-12-2016, IT/2015/statut, Completed
WEiTI Działalność statutowa
Languageen angielski
Score (nominal)15
ScoreMinisterial score = 15.0, 04-09-2019, ArticleFromJournal
Ministerial score (2013-2016) = 15.0, 04-09-2019, ArticleFromJournal
Publication indicators WoS Citations = 0; Scopus Citations = 0; Scopus SNIP (Source Normalised Impact per Paper): 2016 = 0.515
Citation count*2 (2019-12-02)
Cite
Share Share

Get link to the record


* presented citation count is obtained through Internet information analysis and it is close to the number calculated by the Publish or Perish system.
Back
Confirmation
Are you sure?