1. Farnham, G., Atlasis, A.: Detecting DNS tunneling. SANS Institute InfoSec Reading Room, pp. 1–32 (2013)
2. Lecture Notes in Computer Science;W Ellens,2013
3. Evasive Maneuvers by the Wekby group with custom ROP-packing and DNS covert channels.
https://www.anomali.com/blog/evasive-maneuvers-the-wekby-group-attempts-to-evade-analysis-via-custom-rop
4. New Wekby attacks use DNS requests as command and control mechanism (2016).
http://researchcenter.paloaltonetworks.com/2016/05/unit42-new-wekby-attacks-use-dns-requests-as-command-and-control-mechanism/
5. Chinese cyber espionage APT group leveraging recently leaked hacking team exploits to target a financial services firm.
https://www.zscaler.com/blogs/research/chinese-cyber-espionage-apt-group-leveraging-recently-leaked-hacking-team-exploits-target-financial-services-firm