%PDF-1.5
%
1 0 obj
<< /S /GoTo /D (section.1) >>
endobj
4 0 obj
(Introduction)
endobj
5 0 obj
<< /S /GoTo /D (section.2) >>
endobj
8 0 obj
(DNS Protocol)
endobj
9 0 obj
<< /S /GoTo /D (section.3) >>
endobj
12 0 obj
(Related Work)
endobj
13 0 obj
<< /S /GoTo /D (section.4) >>
endobj
16 0 obj
(DNS IDS Approach)
endobj
17 0 obj
<< /S /GoTo /D (subsection.4.1) >>
endobj
20 0 obj
(Stage 1:)
endobj
21 0 obj
<< /S /GoTo /D (subsection.4.2) >>
endobj
24 0 obj
(Stage 2:)
endobj
25 0 obj
<< /S /GoTo /D (section.5) >>
endobj
28 0 obj
(Experimental Results)
endobj
29 0 obj
<< /S /GoTo /D (subsection.5.1) >>
endobj
32 0 obj
(Training Phase :)
endobj
33 0 obj
<< /S /GoTo /D (subsection.5.2) >>
endobj
36 0 obj
(Operational phase :)
endobj
37 0 obj
<< /S /GoTo /D (subsubsection.5.2.1) >>
endobj
40 0 obj
(Experiment 1: False Positive Calculation)
endobj
41 0 obj
<< /S /GoTo /D (subsubsection.5.2.2) >>
endobj
44 0 obj
(Experiment 2- Birthday Attack)
endobj
45 0 obj
<< /S /GoTo /D (subsubsection.5.2.3) >>
endobj
48 0 obj
(Experiment 3- DNS Amplification Attack)
endobj
49 0 obj
<< /S /GoTo /D (subsubsection.5.2.4) >>
endobj
52 0 obj
(Experiment 4- DNS Hijacking)
endobj
53 0 obj
<< /S /GoTo /D (subsubsection.5.2.5) >>
endobj
56 0 obj
(Experiment 5- DNS Tunneling)
endobj
57 0 obj
<< /S /GoTo /D (subsubsection.5.2.6) >>
endobj
60 0 obj
(Experiment 6- Random Subdomain Attack)
endobj
61 0 obj
<< /S /GoTo /D (section.6) >>
endobj
64 0 obj
(Conclusion)
endobj
65 0 obj
<< /S /GoTo /D [66 0 R /Fit] >>
endobj
75 0 obj <<
/Length 2995
/Filter /FlateDecode
>>
stream
xڥrܸV8 ܓeˮ؛:R[DBF$0*گO7!ejt\|>;HN$E(bG2LEw_Kc;>qoQ(=\XFګOVH䢰J0N eX䒈}