1. MITRE ATT&CK® Framework. (2023). Technique T1071.004: Application Layer Protocol: DNS. MITRE Corporation. Retrieved from https://attack.mitre.org/techniques/T1071/004/.
Reference Detail: The framework notes
"Because DNS is a fundamental protocol that is rarely blocked
it is a good candidate for exfiltration... Command and control traffic can be tunneled over DNS to avoid raising suspicion." This supports the choice of DNS as a method likely to evade security controls.
2. Al-kasassbeh
M.
& Adda
M. (2017). DNS Data Exfiltration. In 2017 10th International Conference on Security of Information and Networks (SIN) (pp. 1-5). IEEE. DOI: 10.1109/SIN.2017.8255000.
Reference Detail: Section III
"DNS EXFILTRATION
" discusses how data can be encoded into subdomains of DNS queries. The paper highlights that "DNS traffic is usually not monitored by security devices such as firewalls and intrusion detection systems
" which directly relates to its ability to evade systems like DLP.
3. Papadogiannaki
E.
Vasiliadis
G.
& Polychronakis
M. (2021). An In-depth Analysis of the DNS Querying Behavior of Botnets. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS '21) (pp. 2569–2586). Association for Computing Machinery. DOI: 10.1145/3460120.3484548.
Reference Detail: While focused on botnets
this paper's analysis of DNS as a covert channel (Section 2.2) reinforces the concept that its ubiquitous and trusted nature makes it an ideal medium for stealthy data transfer
bypassing conventional network monitoring.