no code implementations • 5 Aug 2020 • Yael Daihes, Hen Tzaban, Asaf Nadler, Asaf Shabtai
In this paper, we present MORTON, a method that identifies compromised devices in enterprise networks based on the existence of routine DNS communication between devices and disreputable host names.
Cryptography and Security
no code implementations • 24 Feb 2019 • Lior Sidi, Asaf Nadler, Asaf Shabtai
Domain generation algorithms (DGAs) are commonly used by botnets to generate domain names through which bots can establish a resilient communication channel with their command and control servers.
Cryptography and Security