Show simple item record

dc.contributor.author Khole, Sumeet
dc.contributor.author Girdhar, Anup
dc.date.accessioned 2024-02-01T05:14:36Z
dc.date.available 2024-02-01T05:14:36Z
dc.date.issued 2023-11
dc.identifier.citation Review Paper on DNS Tunnelling en_US
dc.identifier.issn 2581-9879
dc.identifier.issn 0076-2571
dc.identifier.uri http://localhost:8080/xmlui/handle/123456789/14801
dc.description.abstract Our internet is made possible by the DNS system; misuse or error can cause it to go down for several days, weeks, or even for a whole region. Similar accidents have in the past caused global disruptions. Tunnelling or command execution was not the intended intent of DNS. Several tools have been developed over time to enable tunnelling, which employs DNS tunnels to allow the transfer of arbitrary data across the DNS infrastructure. DNS security has not gotten as much attention lately because it was not intended for widespread data transport. Consequently, DNS intrusions increasingly pose serious security risks to companies. This paper will review the principles behind the working of DNS tunnelling and some of the utilities that can be used to support it and I will also discuss ways of preventing such attacks using payload analysis and traffic analysis techniques. en_US
dc.language.iso en en_US
dc.publisher Kesari Mahratta Trust en_US
dc.relation.ispartofseries Vol - I;Issue - I
dc.subject Internet en_US
dc.subject DNS en_US
dc.subject Data Transit en_US
dc.title Review Paper on DNS Tunnelling en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account