{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T11:03:48Z","timestamp":1730286228415,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1109\/ntms.2014.6814008","type":"proceedings-article","created":{"date-parts":[[2014,5,16]],"date-time":"2014-05-16T18:40:53Z","timestamp":1400265653000},"page":"1-5","source":"Crossref","is-referenced-by-count":10,"title":["Characterization of Covert Channels in DNS"],"prefix":"10.1109","author":[{"given":"Hamad","family":"Binsalleeh","sequence":"first","affiliation":[]},{"given":"A. Mert","family":"Kara","sequence":"additional","affiliation":[]},{"given":"Amr","family":"Youssef","sequence":"additional","affiliation":[]},{"given":"Mourad","family":"Debbabi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Surveying the DNS threat landscape","author":"rasmussen","year":"2013","journal-title":"Technical Report Internet Identity"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2671"},{"key":"17","first-page":"852","volume":"17","author":"qia","year":"2013","journal-title":"A Bigram Based Real Time DNS Tunnel Detection Approach"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.10"},{"key":"18","first-page":"55","article-title":"Buggenhout. DNS tunneling for network penetration","volume":"7839","author":"raman","year":"2012","journal-title":"Conference on Information Security and Cryptology"},{"journal-title":"Morto Worm Sets A (DNS) Record Technical Report Symantec","year":"2011","author":"mullaney","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01244-0_5"},{"key":"13","article-title":"Black Ops of DNS","author":"kaminsky","year":"2004","journal-title":"Black Hat Briefings"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21323-6_11"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/EC2ND.2011.16"},{"key":"12","article-title":"Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm","author":"holz","year":"2008","journal-title":"USENIX Workshop on Large-scale Exploits and Emergent Threats"},{"key":"21","article-title":"On the viability and performance of DNS tunneling","author":"van leijenhorst","year":"2008","journal-title":"International Conference on Information Technology and Applications"},{"journal-title":"The Role of DNS in Botnetcommand &Control Technical Report","year":"2012","key":"3"},{"key":"20","article-title":"The six most dangerous new attack techniques and whatscoming next?","author":"skoudis","year":"2012","journal-title":"RSA Conference (RSA 12)"},{"journal-title":"F-secure Threat Report H2","year":"2012","key":"2"},{"journal-title":"Spyeye and Zeus Malware Married or Living Separately?","year":"2011","key":"1"},{"key":"10","article-title":"Corrupted DNS resolution paths: The rise of a malicious resolution authority","author":"dagon","year":"2008","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"7","article-title":"DNS as a covert channel within protected networks","author":"bromberger","year":"2011","journal-title":"Technical Report National Electronic Sector Cyber Security Organization"},{"key":"6","article-title":"Detecting DNS tunnels using character frequency analysis","author":"born","year":"2010","journal-title":"6th Annual Security Conference"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2010.5593240"},{"key":"4","article-title":"From throw-Away traffic to bots: Detecting the rise of DGA-based malware","author":"antonakakis","year":"2012","journal-title":"USENIX Security Symposium"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455798"},{"key":"8","first-page":"44","article-title":"The zombie roundup: Understanding, detecting, and disrupting botnets","volume":"39","author":"cooke","year":"2005","journal-title":"USENIX SRUTI Workshop"}],"event":{"name":"2014 6th International Conference on New Technologies, Mobility and Security (NTMS)","start":{"date-parts":[[2014,3,30]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2014,4,2]]}},"container-title":["2014 6th International Conference on New Technologies, Mobility and Security (NTMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6812500\/6813963\/06814008.pdf?arnumber=6814008","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T19:20:01Z","timestamp":1490296801000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6814008\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/ntms.2014.6814008","relation":{},"subject":[],"published":{"date-parts":[[2014,3]]}}}