2021
DOI: 10.1016/j.comnet.2021.108174
|View full text |Cite
|
Sign up to set email alerts
|

DNSxP: Enhancing data exfiltration protection through data plane programmability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…Once the DoH packets have been successfully extracted from HTTPS traffic, feature analysis is performed to determine, which features are still relevant within encrypted traffic to distinguish malicious traffic from benign. In our previous work [25], five key features were identified to distinguish between malicious and benign DNS traffic. These are shown in Table II.…”
Section: Identifying Features For Doh Data Exfiltration Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Once the DoH packets have been successfully extracted from HTTPS traffic, feature analysis is performed to determine, which features are still relevant within encrypted traffic to distinguish malicious traffic from benign. In our previous work [25], five key features were identified to distinguish between malicious and benign DNS traffic. These are shown in Table II.…”
Section: Identifying Features For Doh Data Exfiltration Detectionmentioning
confidence: 99%
“…In this section, an extension to the DNSxP architecture, originally presented in [25], is proposed to enable the handling of DoH traffic. The DoHxP architecture is composed of three main modules; the eBPF labeller attached to the interface of the first switch adjacent to the network hosts, the P4 mirror implemented as the first adjacent switch for hosts within the network, and the ONOS monitor application installed at the network's SDN controller.…”
Section: Dohxp System Architecturementioning
confidence: 99%
“…data exfiltration), current BPF-based solutions (e.g. [38]) focus on detection or dropping of suspect packets, rather than scrubbing. Additionally, we assume that an attacker wishes to hide their modifications from the network control plane, which can monitor the compromised switch by tracking how it handles probe packets.…”
Section: Threat Modelmentioning
confidence: 99%
“…With the rapid development and widespread application of cloud computing technology, more and more enterprises and individuals are storing and migrating data to cloud environments [1]. However, in this environment, network terminals are facing increasingly complex and diverse security threats, such as data leaks, malicious software attacks, and so on.…”
Section: Introductionmentioning
confidence: 99%