A novel approach to detecting covert DNS tunnels using throughput estimation
dc.contributor.author | Himbeault, Michael | |
dc.contributor.examiningcommittee | Card, Paul (Electrical & Computer Engineering) Atrey, Pradeep (Applied Computer Sciences, University of Winnipeg) | en_US |
dc.contributor.supervisor | Baltes, Jacky (Computer Science) McLeod, Bob (Electrical and Computer Engineering) | en_US |
dc.date.accessioned | 2014-04-22T21:10:05Z | |
dc.date.available | 2014-04-22T21:10:05Z | |
dc.date.issued | 2014-04-22 | |
dc.degree.discipline | Electrical and Computer Engineering | en_US |
dc.degree.level | Master of Science (M.Sc.) | en_US |
dc.description.abstract | In a world that relies heavily on data, protection of that data and of the motion of that data is of the utmost importance. Covert communication channels attempt to circumvent established methods of control, such as rewalls and proxies, by utilizing non-standard means of getting messages between two endpoints. The Domain Name System (DNS), the system that translates text-based resource names into machine-readable resource records, is a very common and e ective platform upon which covert channels can be built. This work proposes, and demonstrates the e ectiveness of, a novel technique that estimates data transmission throughput over DNS in order to identify the existence of a DNS tunnel against the background noise of legitimate network tra c. The proposed technique is robust in the face of the obfuscation techniques that are able to hide tunnels from existing detection methods. | en_US |
dc.description.note | May 2014 | en_US |
dc.identifier.uri | http://hdl.handle.net/1993/23550 | |
dc.language.iso | eng | en_US |
dc.rights | open access | en_US |
dc.subject | dns | en_US |
dc.subject | network security | en_US |
dc.subject | entropy | en_US |
dc.subject | covert channels | en_US |
dc.title | A novel approach to detecting covert DNS tunnels using throughput estimation | en_US |
dc.type | master thesis | en_US |