Refer to "The art of cyberwarfare" book
Hiding malicious traffic in trusted protocols: DNS, etc.
Last updated 10 months ago