Behavior Using Passive DNS Analysis. 2015 IEEE
International Conference on Computer and
Information Technology; Ubiquitous Computing and
Communications; Dependable, Autonomic and Secure
Computing; Pervasive Intelligence and Computing,
(pp. 160-167).
Cloudflare. (2020, 01 28). DNS over TLS. Retrieved from
https://developers.cloudflare.com/1.1.1.1/dns-over-tls/
EU. (2016, 04 27). Regulation (EU) 2016/679 of the
European Parliament and of the Council of 27 April
2016 on the protection of natural persons with regard
to the processing of personal data and on the free
movement of such data, and repealing Directive
95/46/EC (General Da. Retrieved 10 24, 2018, from
https://eur-lex.europa.eu/legal-
content/EN/TXT/?qid=1532348683434&uri=CELEX:
02016R0679-20160504
Google. (2019). Google Public DNS now supports DNS-
over-TLS. Retrieved from https://security.google
blog.com/2019/01/google-public-dns-now-supports-
dns-over.html
ICANN root zone. (2020, 01 28). (ICANN.org) Retrieved
01 17, 2020, from http://stats.research.icann.org/dns/
tld_report/archive/index.html
Jirsik, T., Cermak, M., Tovarnak, D., & Celeda, P. (2017).
Toward Stream-Based IP Flow Analysis. IEEE
Communications Magazine, 55(7), 70-76.
Jonathan Woodbridge, Hyrum S. Anderson, Anjum Ahuja,
D. (2016). Predicting Domain Generation Algorithms
with Long Short-Term Memory Networks. 13.
Arlington,VA 22201: Endgame, Inc.
Jose Selvi, Ricardo J.Rodríguez, E.-O. (2019). Detection of
algorithmically generated malicious domain names
using masked N-grams. Elsevier, Volume 124, Pages
156-163.
Kafka, A. (2020, 01 28). (Apache Kafka) Retrieved 08 10,
2019, from https://kafka.apache.org/
Malware domain list. (2020, 01 28). Retrieved 08 10, 2019,
from http://www.malwaredomainlist.com
Minkevics, V., & Kampars, J. (2018). IS Security
Governance Capability Design for Higher Education
Organization. 2018 59th International Scientific
Conference on Information Technology and
Management Science of Riga Technical University
(ITMS), (pp. 1-5).
Mowbray, M., & Hagen, J. (2014). Finding Domain-
Generation Algorithms by Looking at Length
Distribution. 2014 IEEE International Symposium on
Software Reliability Engineering Workshops, (pp. 395-
400).
Mozilla.org. (2020, 01 07). About DNS-over-HTTPS.
(Mozilla.org) Retrieved 01 07, 2020, from
https://support.mozilla.org/en-US/kb/firefox-dns-over-
https#w_about-dns-over-https
Nmap. (2020, 01 28). (NMAP.ORG) Retrieved 08 20, 2019,
from https://nmap.org
PCI DSS: Lessons to learn from recent payment card
breaches. (2018, 09 14). (itgovernance) Retrieved 01
31, 2020, from https://www.itgovernance.co.uk/
blog/pci-dss-lessons-to-learn-from-recent-payment-
card-breaches
Peck, J., Nie, C., Sivaguru, R., Grumer, C., Olumofin, F.,
Yu, B., . . . Cock, M. (2019). CharBot: A Simple and
Effective Method for Evading DGA Classifiers. IEEE
Access, 7, 91759-91771.
Quad9. (2020, 01 28). DoH with Quad9 DNS Servers
.
Retrieved from https://www.quad9.net/doh-quad9-dns-
servers/
Sandkuhl, K., & Stirna, J. (2018). Capability Management
in Digital Enterprises. Springer International
Publishing.
Suricata. (2020, 01 28). Suricata. Retrieved 01 22, 2020,
from https://suricata-ids.org/
Suricata IDS . (2020, 01 28). (The Open Information
Security Foundation.) Retrieved 08 20, 2019, from
https://suricata-ids.org/
Tenable. (2020, 01 28). (Tenable) Retrieved 08 10, 2019,
from https://www.tenable.com/products/nessus/nessus-
professional
The 18 biggest data breaches of the 21st century. (2018, 12
20). (CSO) Retrieved 01 31, 2020, from
https://www.csoonline.com/article/2130877/the-
biggest-data-breaches-of-the-21st-century.html
Truong, D.-T., & Cheng, G. (2016, 9 25). Detecting
domain-flux botnet based on DNS traffic features in
managed network. Security and Communication
Networks, 9(14), 2338-2347.
Trustwave. (2019). 2019 Trustwave Global Security
Report. (Trustwave) Retrieved 08 20, 2019, from
https://www.trustwave.com/en-us/resources/library/
documents/2019-trustwave-global-security-report/
Z. Hu,L. Zhu,J. Heidemann,A. Mankin,D. Wessels, P.
(2016). Specification for DNS over Transport Layer
Security (TLS). 18. IETF Tools.