This paper presents possibility of using of the DNS (Domain Name System) protocol for creating a simplex communication channel between a malware-infected computer with a compromised DNS server. The proposed channel can be used to steal data or confidential enterprise information secretly.
 Fridrich, J., “Applications of Data Hiding in Digital Images”. Tutorial for The ISSPA’99, Brisbane, Australia (August 22-25, 1999).
 Altalhi A. H., Ngadi M. A., Omar S. N., Sidek Z. M., “DNS ID Covert Channel based on Lower Bound Steganography for Normal DNS ID Distribution”. International Journal of Computer Science Issues (IJCSI), 8(6), 2011.
 Mazurczyk, W., Wendzel, S., Zander, S., Houmansadr., A., Szczypiorski, K., “Information Hiding in Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures”, Wiley-IEEE Press; 1 edition, February 2016.
Financed by the National Centre for Research and Development under grant No. SP/I/1/77065/10 by the strategic scientific research and experimental development program:
SYNAT - “Interdisciplinary System for Interactive Scientific and Scientific-Technical Information”.