Download PDFOpen PDF in browser

Data Exfiltration Detection

EasyChair Preprint no. 11295

4 pagesDate: November 15, 2023


Despite the fact that DNS was first developed by Pavel Mockapetris in 1983 and hasn’t been significantly modified since, it still meets the exact requirements of RFC 882. Because packages span a few hosts, networks, and eventually the Internet, they also want to span a few administrations. Limits and associated operating methods (protocol and statistics format, etc.) combine with the number of sources (including mailboxes), the number of supported locations, and the diversity of these environments to create a consistent way to relate to precise sources that are comparable but scattered over the environment. If you want to motivate a powerful problem, Dan Kaminsky, a well-known DNS protection researcher, describes DNS as a globally deployed community that interconnects each private and non-private Internet. This causes extreme problems. Is DNS secure enough? Are you vulnerable to statistics breaches? The solution is that DNS can be used as a backdoor for hackers looking to steal sensitive statistic

Keyphrases: data exfiltration, DNS, Intrusion, protocol

BibTeX entry
BibTeX does not have the right entry for preprints. This is a hack for producing the correct reference:
  author = {Lasya Kanchimreddy and Bhavya Sri Ananthaneni and Mounika Rajulapati and R Akshaya},
  title = {Data Exfiltration Detection},
  howpublished = {EasyChair Preprint no. 11295},

  year = {EasyChair, 2023}}
Download PDFOpen PDF in browser