DNS is an infrastructure protocol that is ubiquitous and enabled in even the most restrictive networks. This makes DNS tunneling a highly effective two-way attack vector that is relatively simple to implement and performs well in terms of latency and bandwidth.

Download your copy of this white paper to learn:

  • How a typical DNS tunneling is mounted
  • Why it has become a popular technique for hackers 
  • How to detect DNS tunneling in your cloud deployments using Alcide Microservices Firewall
footer cta2-Extending Security Group Capabilities with Microservices Firewall (1).png