2017
DOI: 10.1109/tnet.2017.2724506
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Malicious Activity With DNS Backscatter Over Time

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 23 publications
(14 citation statements)
references
References 32 publications
0
14
0
Order By: Relevance
“…Our classification procedure and the parameters for duration and threshold all differ from IPv4 because DNS backscatter is less frequent in IPv6 than in IPv4. The IPv6 duration and threshold (d of 7 days and q of 5 queriers) are both laxer than IPv4, where d = 1 and q = 20 [14]. In preliminary investigations using the IPv4 parameters we did not detect any ground truth scans ( Table 5).…”
Section: Dns Backscatter In Ipv6mentioning
confidence: 87%
See 4 more Smart Citations
“…Our classification procedure and the parameters for duration and threshold all differ from IPv4 because DNS backscatter is less frequent in IPv6 than in IPv4. The IPv6 duration and threshold (d of 7 days and q of 5 queriers) are both laxer than IPv4, where d = 1 and q = 20 [14]. In preliminary investigations using the IPv4 parameters we did not detect any ground truth scans ( Table 5).…”
Section: Dns Backscatter In Ipv6mentioning
confidence: 87%
“…Different from our prior work on DNS backscatter in IPv4 [14], we directly infer the class of originator instead of using machine learning (ML) techniques. We shift away from ML because the number of queriers is much smaller, so the dataset is too small for effective classification with ML.…”
Section: Originator Classification In Ipv6mentioning
confidence: 99%
See 3 more Smart Citations