This preprint has been published elsewhere.
Preprint / Version 1

EVALUATING THE SECURITY IMPLICATIONS OF DNS OVER HTTPS ADOPTION IN ENTERPRISE ENVIRONMENTS

Authors

  • Sheshananda Reddy Kandula Staff Security Engineer at Adobe, USA.

Keywords:

DNS Over HTTPS, DoH, Enterprise Security, Privacy, DNS, Policy Enforcement, Network Monitoring, Traffic Analysis

Abstract

Digital banking infrastructures face increasing threats from sophisticated cyber attackers who continuously exploit vulnerabilities for financial and data gains. Traditional reactive cybersecurity mechanisms are proving inadequate in this evolving threat landscape. This paper explores the integration of proactive cyber deception systems tailored for digital banking networks, focusing on dynamic threat engagement, early attack detection, and adversarial manipulation. Through the design of intelligent decoys, trap-based architectures, and misdirection strategies, the paper demonstrates how proactive deception can complement existing security frameworks. A review of literature, architectural models, implementation strategies, and empirical observations support the argument for adopting deception as a frontline defense in financial cyber ecosystems.

References

[1] Dastjerdi, A.V.: QoS-aware and semantic-based service coordination for multi-cloud environments. PhD Thesis, University of Melbourne (2013)

[2] Dastjerdi, A.V., Garg, S.K., Rana, O.F.: CloudPick: A framework for QoS-aware and ontology-based service deployment across clouds. Software: Practice and Experience 45(11), 1557–1583 (2015)

[3] Schreiner, F.: Resource efficient quality of service management for NGN services in federated cloud environments. PhD Thesis, TU Berlin (2015)

[4] Jayaraman, P.P., Mitra, K., Saguna, S., Åhlund, C.: Orchestrating quality of service in the cloud of things ecosystem. In: Proceedings of the IEEE World Forum on Internet of Things, pp. 70–75. IEEE Press, New York (2015)

[5] Moreno-Vozmediano, R., Montero, R.S., Huedo, E., Llorente, I.M.: Orchestrating the deployment of high availability services on multi-zone and multi-cloud scenarios. Journal of Grid Computing 16(4), 571–593 (2018)

[6] Casalicchio, E., Cardellini, V., Interino, G.: Research challenges in legal-rule and QoS-aware cloud service brokerage. Future Generation Computer Systems 88, 273–283 (2018)

[7] Gajula, S. (2024). Adaptive zero trust architecture for securing financial microservices. Computer Fraud & Security, 2024(12), 643–655. https://doi.org/10.52710/CFS.845

[8] Buyya, R., Broberg, J., Goscinski, A.M. (eds.): Cloud Computing: Principles and Paradigms. Wiley, Hoboken (2011)

[9] Bernstein, D., Ludvigson, E., Sankar, K., Diamond, S., Morrow, M.: Blueprint for the intercloud – protocols and formats for cloud computing interoperability. In: Proceedings of the 4th International Conference on Internet and Web Applications and Services, pp. 328–336. IEEE Press, New York (2009)

[10] Petcu, D.: Multi-cloud: expectations and current approaches. In: Proceedings of the 2013 International Workshop on Multi-cloud Applications and Federated Clouds, pp. 1–6. ACM, New York (2013)

[11] Gajula, S. (2024). Cybersecurity risk prediction using graph neural networks. Journal of Information Systems Engineering and Management, 9(4), 3301–3315. https://doi.org/10.52783/JISEM.V9I4S.13885

[12] Zhang, Q., Cheng, L., Boutaba, R.: Cloud computing: state-of-the-art and research challenges. Journal of Internet Services and Applications 1(1), 7–18 (2010)

[13] Grozev, N., Buyya, R.: Inter-cloud architectures and application brokering: taxonomy and survey. Software: Practice and Experience 44(3), 369–390 (2014)

[14] Papazoglou, M.P., van den Heuvel, W.J.: Blueprinting the cloud. IEEE Internet Computing 15(6), 74–79 (2011)

[15] Nastic, S., Le, D.-H., Truong, H.-L., Dustdar, S.: Provisioning software-defined IoT cloud systems. In: Proceedings of the 11th International Symposium on Network Computing and Applications, pp. 38–45. IEEE Press, New York (2014)

[16] Cardellini, V., Casalicchio, E., Grassi, V., Lo Presti, F., Mirandola, R.: QoS-driven runtime adaptation of service-oriented applications. In: Proceedings of the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, pp. 131–140. ACM, New York (2009)

Posted

2025-07-14