Detecting covert HTTPS beaconing from an internal host using network triage methods including firewall alerts, NetFlow analysis, and domain reputation tools.
-
Updated
May 1, 2025 - Jupyter Notebook
Detecting covert HTTPS beaconing from an internal host using network triage methods including firewall alerts, NetFlow analysis, and domain reputation tools.
This is a MAC flooding attack scenario: the attacker poisons the switch's internal memory by overwhelming it with fake MAC address mappings. As the switch fails open into broadcast mode, the attacker’s NIC (network interface card) now receives traffic not meant for it.
his case study investigates a covert beaconing pattern in which a compromised host periodically sent outbound DNS queries to Google's public resolver (8.8.8.8) at 30-minute intervals without receiving responses.
Add a description, image, and links to the network-triage topic page so that developers can more easily learn about it.
To associate your repository with the network-triage topic, visit your repo's landing page and select "manage topics."