{"id":1384,"date":"2018-07-12T21:38:36","date_gmt":"2018-07-12T21:38:36","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=1384"},"modified":"2020-05-06T10:27:04","modified_gmt":"2020-05-06T17:27:04","slug":"top-security-report-3-dns-top-tunneling-activity","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-3-dns-top-tunneling-activity\/","title":{"rendered":"Top Security Report #3 &#8211; DNS Top Tunneling Activity"},"content":{"rendered":"<p>This blog discusses the report #3 in a series of seven top security reports that can help you defend against bad actors.<\/p>\n<p>Here are the previous parts:\u00a0<a href=\"\/community\/top-7-security-reports-that-help-you-win-against-bad-actors-part\/\" target=\"_blank\" rel=\"noopener noreferrer\">part 1<\/a>, <a href=\"\/community\/top-security-report-7-dns-top-nxdomain-noerror\/\" target=\"_blank\" rel=\"noopener noreferrer\">part 2<\/a>,\u00a0<a href=\"\/community\/top-security-report-6-threat-protection-top-rules-by-source\/\" target=\"_blank\" rel=\"noopener noreferrer\">part 3<\/a>,\u00a0<a href=\"\/community\/top-security-report-5-top-malware-amp-dns-tunneling-by-client\/\" target=\"_blank\" rel=\"noopener noreferrer\">part 4<\/a>,\u00a0<a href=\"\/community\/top-security-report-4-tunneling-traffic-by-category\/\" target=\"_blank\" rel=\"noopener noreferrer\">part 5<\/a><\/p>\n<h2 id=\"toc-hId--1333248617\">DNS Top Tunneling Activity<\/h2>\n<p>Similar to\u00a0<a href=\"\/community\/top-security-report-4-tunneling-traffic-by-category\/\" target=\"_blank\" rel=\"noopener noreferrer\">report #4<\/a>, the DNS Top Tunneling Activity report enables data protection and malware mitigation by listing the overall tunneling activity by client, rather than the category, to show the highest number tunneling activities within a specific period.\u00a0\u00a0<em>Network and security admins<\/em>\u00a0use it frequently because it identifies the clients most often performing DNS tunneling activities and supports security forensics so that teams can take corrective action.\u00a0 It\u2019s a critical report for identifying clients attempting to exfiltrate company data through any DNS tunneling.<\/p>\n<table border=\"0\">\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"488\"><strong>Top Report #3: DNS Top Tunneling Activity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"190\"><strong>Service Area<\/strong><\/td>\n<td width=\"298\">Data Protection &amp; Malware Mitigation<\/td>\n<\/tr>\n<tr>\n<td width=\"190\"><strong>Purpose<\/strong><\/td>\n<td width=\"298\">Lists the clients that have the greatest number of DNS tunneling activities in a given timeframe<\/td>\n<\/tr>\n<tr>\n<td width=\"190\"><strong>Primary User<\/strong><\/td>\n<td width=\"298\">Network &amp; Security Admins<\/td>\n<\/tr>\n<tr>\n<td width=\"190\"><strong>Importance<\/strong><\/td>\n<td width=\"298\">Identifies the clients most often performing DNS tunneling activities, so Security can conduct forensic investigation &amp; take action on those clients<\/td>\n<\/tr>\n<tr>\n<td width=\"190\"><strong>Use Case<\/strong><\/td>\n<td width=\"298\">Enables Security admins to identify clients attempting to exfiltrate company data through any DNS tunneling<\/td>\n<\/tr>\n<tr>\n<td width=\"190\"><strong>Available<\/strong><\/td>\n<td width=\"298\">Out-of-the-box &amp; requires Advanced DNS Protection (ADP)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>As before, the report is accessed through the security dashboard and requires ADP.\u00a0 Admins can sort by time, top Number of tunneling instances, members, source IP addresses, source ports, NAT status and bar chart, data table or combined views.\u00a0 Again, this data can be captured in .pdf and emailed automatically to designated teams.\u00a0 The overall DNS Top Tunneling report is essential for identifying, triaging and removing sources of malware tunneling and data exfiltration on the network.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1388\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/top-security-report-3-dns-top-tunneling-activity-report.png\" alt=\"Top Security Report #3 - DNS Top Tunneling Activity Report\" width=\"599\" height=\"295\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/top-security-report-3-dns-top-tunneling-activity-report.png 599w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/top-security-report-3-dns-top-tunneling-activity-report-300x148.png 300w\" sizes=\"auto, (max-width: 599px) 100vw, 599px\" \/><\/p>\n<p>Here are the seven (7) security reports that can give you an edge over the bad actors.<\/p>\n<ul>\n<li><a href=\"\/community\/top-security-report-7-dns-top-nxdomain-noerror\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top Security Report #7: DNS Top NXDOMAIN \u2013 NOERROR<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-6-threat-protection-top-rules-by-source\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top Report #6: Threat Protection &#8211; Top Rules by Source<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-5-top-malware-amp-dns-tunneling-by-client\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top Report #5: Top Malware &amp; DNS Tunneling by Client<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-4-tunneling-traffic-by-category\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top Report #4: Tunneling Traffic by Category<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-3-dns-top-tunneling-activity\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top Report #3: DNS Top Tunneling Activity<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-2-malicious-activity-by-client\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top Report #2: Malicious Activity by Client<\/a><\/li>\n<li><a href=\"\/community\/top-security-report-1-dns-top-rpz-hits\/\" target=\"_self\" rel=\"noopener noreferrer\">Top Report #1: DNS Top RPZ Hits<\/a><\/li>\n<\/ul>\n<h2 id=\"toc-hId--445744936\">Learn more:<\/h2>\n<ul>\n<li>Join the Infoblox Reporting &amp; Analytics Technical Demo Series to continue the discussion in the free webinar on 7\/17, 2018, 9A PDT, 12P EDT, 5P BST.\u00a0<a href=\"https:\/\/infoblox.zoom.us\/meeting\/register\/a4f2cc50de136b83dc2040ba88984b7b\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Register<\/a><\/li>\n<li>As an existing Infoblox DDI customer, you can deploy a virtual Infoblox Reporting &amp; Analytics appliance free of charge \u2014 no strings attached.\u00a0<a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=http-3A__info.infoblox.com_WW-5FFY17-5FOS-5FFR-5FReportingAnalyticsFreeTierDownload-3Futm-5Fsource-3Dblox-2Dcommunity-26utm-5Fcampaign-3Dcommunity-2Dq2&amp;d=DwMGaQ&amp;c=UrUhmHsiTVT5qkaA4d_oSzcamb9hmamiCDMzBAEwC7E&amp;r=GVp6jcnVnuL0Gt3sI2iNDqwbBy_ggT-pLWoFGKRoaBo&amp;m=xZuyCuq7F8uEaK9Dd665WpoPRXMvCdoYGfRiUJijM-c&amp;s=qDnqbSNVyVRYSOGBWT5PePzVe6QhRyEmiqm7M_ymXos&amp;e=&amp;utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Download<\/a>\u00a0and try the\u00a0<a href=\"http:\/\/info.infoblox.com\/WW_FY17_OS_FR_ReportingAnalyticsFreeTierDownload?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_source=blox-community&amp;utm_campaign=community-q2\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Reporting &amp; Analytics Free Tier today.<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>This blog discusses the report #3 in a series of seven top security reports that can help you defend against bad actors. Here are the previous parts:\u00a0part 1, part 2,\u00a0part 3,\u00a0part 4,\u00a0part 5 DNS Top Tunneling Activity Similar to\u00a0report #4, the DNS Top Tunneling Activity report enables data protection and malware mitigation by listing the [&hellip;]<\/p>\n","protected":false},"author":168,"featured_media":894,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[64,15],"class_list":{"0":"post-1384","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-reporting-and-analytics","9":"tag-security","10":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Top Security Report #3 - DNS Top Tunneling Activity<\/title>\n<meta name=\"description\" content=\"This blog discusses the report #3 in a series of seven top security reports that can help you defend against bad actors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-3-dns-top-tunneling-activity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top Security Report #3 - DNS Top Tunneling Activity\" \/>\n<meta property=\"og:description\" content=\"This blog discusses the report #3 in a series of seven top security reports that can help you defend against bad actors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-3-dns-top-tunneling-activity\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-12T21:38:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bob Rose\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bob Rose\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-3-dns-top-tunneling-activity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-3-dns-top-tunneling-activity\\\/\"},\"author\":{\"name\":\"Bob Rose\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3a21a946a9f6a3cc19856eabf95c687\"},\"headline\":\"Top Security Report #3 &#8211; DNS Top Tunneling Activity\",\"datePublished\":\"2018-07-12T21:38:36+00:00\",\"dateModified\":\"2020-05-06T17:27:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-3-dns-top-tunneling-activity\\\/\"},\"wordCount\":410,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-3-dns-top-tunneling-activity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threatindexblog.jpg\",\"keywords\":[\"Reporting and Analytics\",\"Security\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-3-dns-top-tunneling-activity\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-3-dns-top-tunneling-activity\\\/\",\"name\":\"Top Security Report #3 - DNS Top Tunneling Activity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-3-dns-top-tunneling-activity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-3-dns-top-tunneling-activity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threatindexblog.jpg\",\"datePublished\":\"2018-07-12T21:38:36+00:00\",\"dateModified\":\"2020-05-06T17:27:04+00:00\",\"description\":\"This blog discusses the report #3 in a series of seven top security reports that can help you defend against bad actors.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-3-dns-top-tunneling-activity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-3-dns-top-tunneling-activity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-3-dns-top-tunneling-activity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threatindexblog.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threatindexblog.jpg\",\"width\":660,\"height\":454,\"caption\":\"IPv6 and Internet Privacy\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/top-security-report-3-dns-top-tunneling-activity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Top Security Report #3 &#8211; DNS Top Tunneling Activity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e3a21a946a9f6a3cc19856eabf95c687\",\"name\":\"Bob Rose\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_168_1571767300-96x96.png\",\"caption\":\"Bob Rose\"},\"description\":\"Bob has over 25 years of mid-to-senior level experience in B2B and B2C product marketing, product, project, program and partner management. This includes 14 years in technology (DDI, RPA, fintech, wireless and mobile apps, GIS and biometrics), 9 years in financial services, 3 years in healthcare and 2 years in manufacturing. He did his post-graduate work in Project Management and Quality and holds a Marketing Management BBA from Pacific Lutheran University in Tacoma, WA. He spends his personal time engaged in adult and youth ministries, coaching and watching soccer (go Liverpool FC &amp; Sounders FC), sailing, camping, and listening to a variety of Christian, jazz and instrumental music.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/bob-rose\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Top Security Report #3 - DNS Top Tunneling Activity","description":"This blog discusses the report #3 in a series of seven top security reports that can help you defend against bad actors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-3-dns-top-tunneling-activity\/","og_locale":"en_US","og_type":"article","og_title":"Top Security Report #3 - DNS Top Tunneling Activity","og_description":"This blog discusses the report #3 in a series of seven top security reports that can help you defend against bad actors.","og_url":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-3-dns-top-tunneling-activity\/","og_site_name":"Infoblox Blog","article_published_time":"2018-07-12T21:38:36+00:00","article_modified_time":"2020-05-06T17:27:04+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog.jpg","type":"image\/jpeg"}],"author":"Bob Rose","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bob Rose","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-3-dns-top-tunneling-activity\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-3-dns-top-tunneling-activity\/"},"author":{"name":"Bob Rose","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e3a21a946a9f6a3cc19856eabf95c687"},"headline":"Top Security Report #3 &#8211; DNS Top Tunneling Activity","datePublished":"2018-07-12T21:38:36+00:00","dateModified":"2020-05-06T17:27:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-3-dns-top-tunneling-activity\/"},"wordCount":410,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-3-dns-top-tunneling-activity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog.jpg","keywords":["Reporting and Analytics","Security"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-3-dns-top-tunneling-activity\/","url":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-3-dns-top-tunneling-activity\/","name":"Top Security Report #3 - DNS Top Tunneling Activity","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-3-dns-top-tunneling-activity\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-3-dns-top-tunneling-activity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog.jpg","datePublished":"2018-07-12T21:38:36+00:00","dateModified":"2020-05-06T17:27:04+00:00","description":"This blog discusses the report #3 in a series of seven top security reports that can help you defend against bad actors.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-3-dns-top-tunneling-activity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/top-security-report-3-dns-top-tunneling-activity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-3-dns-top-tunneling-activity\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog.jpg","width":660,"height":454,"caption":"IPv6 and Internet Privacy"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/top-security-report-3-dns-top-tunneling-activity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"Top Security Report #3 &#8211; DNS Top Tunneling Activity"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/e3a21a946a9f6a3cc19856eabf95c687","name":"Bob Rose","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_168_1571767300-96x96.png","caption":"Bob Rose"},"description":"Bob has over 25 years of mid-to-senior level experience in B2B and B2C product marketing, product, project, program and partner management. This includes 14 years in technology (DDI, RPA, fintech, wireless and mobile apps, GIS and biometrics), 9 years in financial services, 3 years in healthcare and 2 years in manufacturing. He did his post-graduate work in Project Management and Quality and holds a Marketing Management BBA from Pacific Lutheran University in Tacoma, WA. He spends his personal time engaged in adult and youth ministries, coaching and watching soccer (go Liverpool FC &amp; Sounders FC), sailing, camping, and listening to a variety of Christian, jazz and instrumental music.","url":"https:\/\/www.infoblox.com\/blog\/author\/bob-rose\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1384","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/168"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=1384"}],"version-history":[{"count":6,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1384\/revisions"}],"predecessor-version":[{"id":3647,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/1384\/revisions\/3647"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/894"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=1384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=1384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=1384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}