[1] |
KAMINSKY D . The black OPS of DNS[A]. Proceedings of the Black Hat USA 2004[C]. Las Vegas, 2004.
|
[2] |
LEIJENHORST T V , CHIN K-W , LOWE D . On the viability and performance of DNS tunneling[A]. Proceedings of the 5th International Conference on Information Technology and Applications[C]. Cairns,Australia, 2008.
|
[3] |
NUSSBAUM L , NEYRON P , RICHARD O . On robust covert channels inside DNS[A]. Proceedings of the 24th IFIP International Security Conference[C]. Pafos,Cyprus, 2009.
|
[4] |
MERLO A , PAPALEO G , VENEZIANO S , et al . A comparativeperformance evaluation of DNS tunneling tools[A].Proceedings of the 5th International Conference on Complex,Intelligent,and Software Intensive Systems[C]. Seoul,Korea, 2011. 84-91.
|
[5] |
REVELLI A , LEIDECKER N . Introducing heyoka: DNS tunneling 2.0[A]. Proceedings of the SOURCE Conference Boston[C]. Boston, 2009.
|
[6] |
BORN K . PSUDP: a passive approach to network-wide covert communication[A]. Proceedings of the Black Hat USA 2010[C]. Las Vegas, 2010.
|
[7] |
ZANDER S , ARMITAGE G , BRANCH P . A survey of covert channels and countermeasures in computer network protocols[J]. Communications Surveys & Tutorials,IEEE, 2007,9(3):44-57.
|
[8] |
DUSI M , CROTTI M , GRINGOLI F , et al . Tunnel hunter: detecting application-layer tunnels with statistical fingerprinting[J]. Computer Networks, 2009,53(1):81-97.
|
[9] |
ANDERSSON B , EKMAN E . Iodine[EB/OL]. 2011.
|
[10] |
BORN K , GUSTAFSON D . NgViz: detecting DNS tunnels through N-gram visualization and quantitative analysis[A]. Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research[C]. Oak Ridge,Tennessee, 2010. 1-4.
|
[11] |
BORN K , GUSTAFSON D . Detecting DNS tunnels using character frequency analysis[A]. Proceedings of the 9th Annual Security Conference[C]. Las Vegas,Nevada, 2010.
|
[12] |
GIL T M . NSTX (IP-over-DNS)[EB/OL]. .
|
[13] |
PIETRASZEK T . DNScat[EB/OL]. 2011.
|
[14] |
DEMBOUR O . Dns2tcp[EB/OL]. http://www.hsc.fr/ressources/ outils/dns2tcp/index.html.en, 2011.
|
[15] |
VALENZUELA T . Tcp-over-dns[EB/OL]. http://analogbit.com/ software/tcp-over-dns, 2011.
|
[16] |
HALL M , FRANK E , HOLMES G , et al . The WEKA data mining software: an update[J]. SIGKDD Explorations, 2009,11(1):10-18.
|