نتایج جستجو برای: dns traffic analysis

تعداد نتایج: 2901162  

2003
Kun-chan Lan Alefiya Hussain Debojyoti Dutta Marina Del Rey

The Internet has witnessed a steady rise in malicious traffic including DDoS and worm attacks. In this paper, we study the effect of malicious traffic on the background traffic by analyzing recent traces from two different locations. We show that malicious traffic causes an increase in the average DNS latency by 230% and an increase in the average web latency by 30% even on highly over-provisio...

2010

Review: Anycast-Aware Transport for Content Delivery Networks Published at the most recent WWW conference (WWW ’09), “Anycast-Aware Transport for Content Delivery Networks” attempts to address several challenges in utilizing IP anycast as a redirection mechanism for content delivery networks (CDNs). Typically, DNS is used by CDNs to automatically distribute load to the most appropriate edge-ser...

Journal: :Digital Investigation 2007
Bruce J. Nikkel

This practitioner paper provides an introduction to investigating IPv6 networks and systems. IPv6 addressing, packet structure, and supporting protocols are explained. Collecting information from IPv6 registries and databases such as Whois and DNS is demonstrated. Basic concepts and methods relevant for digital forensic investigators are highlighted, including the forensic analysis of IPv6 enab...

2011
Scott Campbell Steve Chan Jason Lee

Fast Flux Service Networks (FFSN) apply high availability server techniques to the business of malware distribution. FFSNs are similar to commercial content distribution networks (CDN), such as Akamai, in terms of size, scope, and business model, serving as an outsourced content delivery service for clients. Using an analysis of DNS traffic, we derive a sequential hypothesis-testing algorithm b...

2016
Matija Stevanovic Jens Myrup Pedersen

Botnets, as networks of compromised “zombie” computers, represent one of the most serious security threats on the Internet today. This paper explores how machines compromised with bot malware can be identified at local and enterprise networks in accurate and time-efficient manner. The paper introduces a novel multi-level botnet detection approach that performs network traffic analysis of three ...

2013
Max Potasznik

On or about August 25 2013, the name servers supporting the country code Top Level Domain (ccTLD) “.cn” were attacked and brought offline[2, 6–8, 11]. As local DNS caches expired, this attack eventually affected the internet traffic of most users attempting to reach Chinese websites because the authoritative DNS servers for those sites ceased working. While the attack itself was widely reported...

2012
Daan Raman Bjorn De Sutter Bart Coppens Stijn Volckaert Koen De Bosschere Pieter Danhieux Erik Van Buggenhout

Most networks are connected to the Internet through firewalls to block attacks from the outside and to limit communication initiated from the inside. Because of the limited, supposedly safe functionality of the Domain Name System protocol, its traffic is by and large neglected by firewalls. The resulting possibility for setting up information channels through DNS tunnels is already known, but a...

Journal: :CoRR 2013
Stefano Schiavoni Federico Maggi Lorenzo Cavallaro Stefano Zanero

Modern botnets rely on domain-generation algorithms (DGAs) to build resilient command-and-control infrastructures. Recent works focus on recognizing automatically generated domains (AGDs) from DNS traffic, which potentially allows to identify previously unknown AGDs to hinder or disrupt botnets’ communication capabilities. The state-of-the-art approaches require to deploy low-level DNS sensors ...

2010
Cheng Huang Nic Holt Angela Wang Albert G. Greenberg Jin Li Keith W. Ross

An edge network deployment consists of many (tens to a few hundred) satellite data centers. To optimize enduser perceived performance, a Global Traffic Management (GTM) solution needs to continuously monitor the performance between the users and the data centers, in order to dynamically select the “best” data center for each user. Though widely adopted in practice, GTM solutions based on active...

Journal: :Digital Investigation 2014
Elias Bou-Harb Nour-Eddine Lakhdari Hamad Binsalleeh Mourad Debbabi

During November 2013, the operational cyber/network security community reported an unprecedented increase of traffic originating from source port 0. This event was deemed as malicious although its core aim and mechanism were obscured. This paper investigates that event using a multifaceted approach that leverages three real network security feeds that we receive on a daily basis, namely, darkne...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید