Skip navigation

Please use this identifier to cite or link to this item: http://10.10.120.238:8080/xmlui/handle/123456789/334
Title: Evading DoH via Live Memory Forensics for Phishing Detection and Content Filtering
Authors: Varshney G.
Iyer P.
Atrey P.
Misra M.
Issue Date: 2021
Publisher: Institute of Electrical and Electronics Engineers Inc.
Abstract: Internet will see a boost in the DNS over HTTPS (DoH) traffic to enhance user privacy. The existing mechanisms of monitoring/filtering DNS traffic at end points/gateways that rely on URLs (either received via operating system DNS Client or via header analysis of DNS queries over network) will not work. In this paper, we propose a novel idea to uncover the DoH traffic by directly sniffing URLs from the RAM of end points/client machines. Our approach can be used by an organization's content filtering and phishing detection solutions. The contents viewed from their computing systems by employees can be monitored and controlled even when they use browsers supporting DoH to hide DNS queries. Our experimental analysis demonstrates feasibility, effectiveness and robustness of the proposed idea. © 2021 IEEE.
URI: https://dx.doi.org/10.1109/COMSNETS51098.2021.9352935
http://localhost:8080/xmlui/handle/123456789/334
ISBN: 978-1728191270
Appears in Collections:Conference Paper

Files in This Item:
There are no files associated with this item.
Show full item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.