This indicates detection of suspicious traffics that might be from a DNS Tunnel.
DNS tunnels are proxy tools that can tunnel data over DNS to bypass firewall policy. Some malware and APT attacks have used DNS tunnels to communicate with C&C servers.
System Compromise: Remote attackers can gain control of vulnerable systems.
Monitor traffics from the network for any suspicious activity.