Detect DNS Data Exfiltration using pretrained model in DSDL
Exfiltration Over Unencrypted Non-C2 Protocol
Exfiltration Over Unencrypted Non-C2 Protocol
Compromise Software Supply Chain
Domain Generation Algorithms
Domain Generation Algorithms
DNS, Application Layer Protocol
Protocol Tunneling, Proxy, Web Service
Exfiltration Over Unencrypted Non-C2 Protocol
Exfiltration Over Unencrypted Non-C2 Protocol, Exfiltration Over Alternative Protocol
Drive-by Compromise
Exploitation for Client Execution
Exfiltration Over Unencrypted Non-C2 Protocol
Spearphishing via Service
Exfiltration Over Unencrypted Non-C2 Protocol
DNS, Application Layer Protocol
Network Denial of Service, Reflection Amplification