نتایج جستجو برای: dns traffic analysis

تعداد نتایج: 2901162  

Journal: :Computer Communications 2014
Jehyun Lee Heejo Lee

Malicious activities on the Internet are one of the most dangerous threats to Internet users and organizations. Malicious software controlled remotely is addressed as one of the most critical methods for executing the malicious activities. Since blocking domain names for command and control (C&C) of the malwares by analyzing their Domain Name System (DNS) activities has been the most effective ...

2012
Eric Osterweil Danny McPherson Steve DiBenedetto Christos Papadopoulos Daniel Massey

This paper provides the first systematic study of DNS data taken from one of the 13 servers for the .com/.net registry. DNS’ generic Top Level Domains (gTLDs) such .com and .net serve resolvers from throughout the Internet and respond to billions of DNS queries every day. This study uses gTLD data to characterize the DNS resolver population and profile DNS query types. The results show a small ...

2013
Shubhangi Kharche Pramod B. Patil Jed Kaplan David J. Wright Jun Wang Olivier Hersent Jean-Pierre

Today's era of packet switched networks demands larger bandwidth to suffice the need to integrate multimedia applications like Internet gaming, transmission of voice etc. It becomes necessary to judge the network performance with the allocated bandwidth. Network performance depends mainly on the efficiency of the protocol used in addition to load on the network, the transmission system typ...

2004
KyoungSoo Park Vivek S. Pai Larry L. Peterson Zhe Wang

The Domain Name System (DNS) is a ubiquitous part of everyday computing, translating human-friendly machine names to numeric IP addresses. Most DNS research has focused on server-side infrastructure, with the assumption that the aggressive caching and redundancy on the client side are sufficient. However, through systematic monitoring, we find that client-side DNS failures are widespread and fr...

2016
Zhihao Li Dave Levin Bobby Bhattacharjee Neil Spring

DNS root name servers play a crucial role in the Internet operation. Detecting and identifying anomalous activities around root servers is a critical task for network operators. It is not hard to “detect” the huge attacks [1], but how do we detect more than just the strongest, most extreme signals? How can we go about extracting, studying and understanding the smaller (but still nontrivial) ano...

Journal: :Balkan Journal of Electrical and Computer Engineering 2018

2011
Leyla Bilge Engin Kirda Christopher Krügel Marco Balduzzi

The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way mapping between domain names and their numerical identifiers. Given its fundamental role, it is not surprising that a wide variety of malicious activities involve the domain name service in one way or another. For example, bots resolve DNS names to locate their command and control servers...

2014
Marcel Waldvogel Thomas Zink

SRV records, DNSSEC, and DANE among others fortify the Domain Name System as the central information hub behind the Internet. Largely hidden from the end user, an increasing number of protocol and trust decisions are contingent on DNS. Neglect or attacks on DNS have much more impact today than ever, now endangering security far beyond denial of service. Opportunistic Persistent DNS (opDNS) addr...

2007
Jon Oberheide Manish Karir Zhuoqing Morley Mao

Security researchers and network operators increasingly rely on information gathered from honeypots and sensors deployed on darknets, or unused address space, for attack detection. While the attack traffic gleaned from such deployments has been thoroughly scrutinized, little attention has been paid to DNS queries targeting these addresses. In this paper, we introduce the concept of dark DNS, th...

2004
Jarmo Mölsä

This paper describes and analyzes a new mechanism to mitigate flooding Denial of Service (DoS) attacks against the Domain Name System (DNS). This mechanism is based on increasing the Time To Live (TTL) value of end-host IP addresses (DNS A records) when a name server is being overloaded with DoS attack traffic. This mechanism is most suitable for popular name servers providing authoritative DNS...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید