1. Use of DNS tunneling for C&C communications, https://securelist.com/use-of-dns-tunneling-for-cc-communications/78203/.
2. UDPoS - exfiltrating credit card data via DNS, https://www.forcepoint.com/zh-hans/blog/x-labs/udpos-exfiltrating-credit-card-data-dns.
3. V. Paxson, M. Christodorescu, M. Javed, J. Rao, R. Sailer, D.L. Schales, M. Stoecklin, K. Thomas, W. Venema, N. Weaver, Practical Comprehensive Bounds on Surreptitious Communication over DNS, in: 22nd USENIX Security Symposium, USENIX Security, 2013, pp. 17–32.
4. Detecting DNS tunnel through binary-classification based on behavior features;Liu,2017
5. A byte-level CNN method to detect DNS tunnels;Liu,2019