2012
DOI: 10.1007/978-3-642-28537-0_21
|View full text |Cite
|
Sign up to set email alerts
|

Behavior of DNS’ Top Talkers, a .com/.net View

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
8
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 5 publications
2
8
0
Order By: Relevance
“…A small fraction of deployed DNS resolvers are serving the majority of the DNS queries. This observation is consistent with that of prior measurement studies by Pang et al [41] in 2004 and Osterweil et al [38] in 2012. Interestingly, the vast majority of inactive resolvers belong to a European educational institution We subsequently learned that DNS experiments are conducted at these institutions, and speculate that ongoing DNS experiments may be the reason behind the large number of inactive DNS resolvers.…”
Section: A High-level Characteristicssupporting
confidence: 93%
“…A small fraction of deployed DNS resolvers are serving the majority of the DNS queries. This observation is consistent with that of prior measurement studies by Pang et al [41] in 2004 and Osterweil et al [38] in 2012. Interestingly, the vast majority of inactive resolvers belong to a European educational institution We subsequently learned that DNS experiments are conducted at these institutions, and speculate that ongoing DNS experiments may be the reason behind the large number of inactive DNS resolvers.…”
Section: A High-level Characteristicssupporting
confidence: 93%
“…None queried for ad.doubleclick.net, the most commonly misdirected ad host. Further, the forwarders queried for several thousand host names during the course of a day but the peak query rate observed from any forwarder was 500 queries per minute, which is lower than one would expect from busy resolvers [33]. Finally, the Russian forwarders were busier and exhibited little in the way of diurnal patterns, possibly indicating the diversity of victims around the globe.…”
Section: Malicious Resolversmentioning
confidence: 93%
“…255 Level Domain (TLD) infrastructure, and its instances of the global DNS root zone. Verisign services over a billion DNS queries per day, hosts well over one hundred million domain names, and because of .com's and .net's popularity, one could argue that almost every heavily used DNS resolver will eventually send queries to this infrastructure [33]. Additionally, Verisign's infrastructure is composed of multiple sites around the world and on several continents.…”
Section: Malicious Resolversmentioning
confidence: 99%
See 1 more Smart Citation
“…Beside premium services, such public DNSes offer the service at no cost while making revenues through advertisements, web traffic redirection and mining of DNS data. Although the DNS is perceived as a critical infrastructure [2], all publicly available DNS traffic monitoring tools [3] [4] focus only on aggregate values such as the type and number of queries received by a DNS server [5]. Research and academia have focused on DNS for the purpose of identifying malicious activities [6] [7] [8], managing large DNS infrastructures [9], understanding how DNS server selection and caching works in reality [10] [11], and modeling its infrastructure in order to predict how DNS traffic will change under specific conditions [12].…”
Section: Introduction and Related Workmentioning
confidence: 99%