Network Steganography in the DNS Protocol

7Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.

Abstract

This paper presents possibility of using of the DNS (Domain Name System) protocol for creating a simplex communication channel between a malware-infected computer with a compromised DNS server. The proposed channel can be used to steal data or confidential enterprise information secretly.

Author supplied keywords

Cite

CITATION STYLE

APA

Drzymała, M., Szczypiorski, K., & Urbański, M. Ł. (2016). Network Steganography in the DNS Protocol. International Journal of Electronics and Telecommunications, 62(4), 343–346. https://doi.org/10.1515/eletel-2016-0047

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free