Abstract

Cyber attacks are occurring at an exponential rate. Adversaries are opting for advanced techniques to abuse network protocols for conducting unauthorised operations. Domain generation algorithms (DGAs) are designed by malware authors to trigger malicious DNS communication. This article looks at the current state of DNS-based threats and how to detect DGA-based malicious DNS communication.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call