LogicMonitor + Catchpoint: Enter the New Era of Autonomous IT

Learn more

Get visibility into what your DNS traffic is really doing.

LogicMonitor monitors DNS infrastructure health and query patterns to help security and network teams detect anomalies that signal tunneling, exfiltration, or misuse.

What is DNS tunneling?

DNS tunneling is a technique that encodes non-DNS data inside DNS query and response packets. Because most networks allow DNS traffic outbound, attackers use tunneling to establish covert channels that bypass firewalls and data loss prevention tools.

How do attackers use DNS tunneling?

An attacker establishes a malicious DNS server and registers a domain pointing to it. Malware on a compromised machine encodes data in DNS queries, embedding it in long subdomain strings. The attacker’s DNS server receives these queries, decodes the payload, and can respond with commands.

How do you detect DNS tunneling?

Detection relies on behavioral analysis. Key indicators include unusually long subdomain strings (often 100+ characters), high query volumes to a single domain, frequent use of uncommon record types like TXT or NULL, and large response payloads.

How do you prevent DNS tunneling?

 Prevention involves: restricting DNS resolution to authorized internal resolvers, deploying DNS monitoring tools that detect behavioral anomalies, using DNS firewall solutions that identify known tunneling tools, and implementing network segmentation to limit outbound DNS requests.