dc.contributor.author |
Khole, Sumeet |
|
dc.contributor.author |
Girdhar, Anup |
|
dc.date.accessioned |
2024-02-01T05:14:36Z |
|
dc.date.available |
2024-02-01T05:14:36Z |
|
dc.date.issued |
2023-11 |
|
dc.identifier.citation |
Review Paper on DNS Tunnelling |
en_US |
dc.identifier.issn |
2581-9879 |
|
dc.identifier.issn |
0076-2571 |
|
dc.identifier.uri |
http://localhost:8080/xmlui/handle/123456789/14801 |
|
dc.description.abstract |
Our internet is made possible by the DNS system; misuse or error can cause it to go down for several days, weeks, or even for a whole region. Similar accidents have in the past caused global disruptions.
Tunnelling or command execution was not the intended intent of DNS. Several tools have been developed over time to enable tunnelling, which employs DNS tunnels to allow the transfer of arbitrary data across the DNS infrastructure. DNS security has not gotten as much attention lately because it was not intended for widespread data transport. Consequently, DNS intrusions increasingly pose serious security risks to companies. This paper will review the principles behind the working of DNS tunnelling and some of the utilities that can be used to support it and I will also discuss ways of preventing such attacks using payload analysis and traffic analysis techniques. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Kesari Mahratta Trust |
en_US |
dc.relation.ispartofseries |
Vol - I;Issue - I |
|
dc.subject |
Internet |
en_US |
dc.subject |
DNS |
en_US |
dc.subject |
Data Transit |
en_US |
dc.title |
Review Paper on DNS Tunnelling |
en_US |
dc.type |
Article |
en_US |