Skip navigation

Please use this identifier to cite or link to this item: http://10.10.120.238:8080/xmlui/handle/123456789/334
Full metadata record
DC FieldValueLanguage
dc.contributor.authorVarshney G.en_US
dc.contributor.authorIyer P.en_US
dc.contributor.authorAtrey P.en_US
dc.contributor.authorMisra M.en_US
dc.date.accessioned2023-11-30T08:28:45Z-
dc.date.available2023-11-30T08:28:45Z-
dc.date.issued2021-
dc.identifier.isbn978-1728191270-
dc.identifier.otherEID(2-s2.0-85102047950)-
dc.identifier.urihttps://dx.doi.org/10.1109/COMSNETS51098.2021.9352935-
dc.identifier.urihttp://localhost:8080/xmlui/handle/123456789/334-
dc.description.abstractInternet will see a boost in the DNS over HTTPS (DoH) traffic to enhance user privacy. The existing mechanisms of monitoring/filtering DNS traffic at end points/gateways that rely on URLs (either received via operating system DNS Client or via header analysis of DNS queries over network) will not work. In this paper, we propose a novel idea to uncover the DoH traffic by directly sniffing URLs from the RAM of end points/client machines. Our approach can be used by an organization's content filtering and phishing detection solutions. The contents viewed from their computing systems by employees can be monitored and controlled even when they use browsers supporting DoH to hide DNS queries. Our experimental analysis demonstrates feasibility, effectiveness and robustness of the proposed idea. © 2021 IEEE.en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.source2021 International Conference on COMmunication Systems and NETworkS, COMSNETS 2021en_US
dc.titleEvading DoH via Live Memory Forensics for Phishing Detection and Content Filteringen_US
dc.typeConference Paperen_US
Appears in Collections:Conference Paper

Files in This Item:
There are no files associated with this item.
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.