Data Exfiltration Detection

Overview

While Phoebe would kindly return Ross’ The Science Boy and apologize for what she’s done. A hacker, on the other hand, would not be so nice. Data is the core of the cybersecurity (and probably the modern technology). Different protocols can be used for this: DNS, FTP, HTTP, SMTP

2. Description

2.2 Indicators

2.2.1 DNS Tunneling

2.2.2 FTP

2.2.3 HTTP

2.2.4 SMTP