2012 IEEE Network Operations and Management Symposium 2012
DOI: 10.1109/noms.2012.6212019
|View full text |Cite
|
Sign up to set email alerts
|

DNSSM: A large scale passive DNS security monitoring framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(14 citation statements)
references
References 9 publications
0
14
0
Order By: Relevance
“…Marchal, et al in their work suggest the following features: the number of unique records address, the rate of growth in the number of unique addresses, time of life of the records, the number of unique records of name servers address as well as additional features related to the domain name: similarity of the domain names with the dictionary, the similarity of certain elements of the domain with valid domain names [26]. The work has proposed a new concept for the evaluation of the domain name.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Marchal, et al in their work suggest the following features: the number of unique records address, the rate of growth in the number of unique addresses, time of life of the records, the number of unique records of name servers address as well as additional features related to the domain name: similarity of the domain names with the dictionary, the similarity of certain elements of the domain with valid domain names [26]. The work has proposed a new concept for the evaluation of the domain name.…”
Section: Related Workmentioning
confidence: 99%
“…This set of data was manually classified to provide D CDN ' and D BOT ' sets. [20,21,27] No No No Medium Large F2 Place of domain registration (country) [20] Yes No Yes Small Small F3 Number of subdomains in the domain [26] Yes No Yes Medium Large F4 The domain name according to dictionary [26,30,32] Yes No Can Large Small F5 The similarity of certain elements of the domain name with a valid domain name [26,30,33] Yes No Yes Medium Large F6 Numbers in domain names [27] Yes No Yes Small Small F7 The length of the longest word in the domain name [27] Yes No Yes Small Small F8 Number and duration of the connection [26] No No Yes Large Large F9 Similar daily behavior of the domain [27,32] No No Yes Large Large F10 Recurring cycles of query to the authoritative server [28] No The summary set of data used for experimental setup is given by:…”
Section: Evaluation Of Feature Characteristicsmentioning
confidence: 99%
See 1 more Smart Citation
“…This approach is used by [4,11,12] for the detection of botnets based on the same DNS behaviour of devices, abnormal DNS traffic or malicious domain usage. This type of data can be also used for an intrusion detection system based on DNS traffic monitoring which was introduced in [18].…”
Section: Related Workmentioning
confidence: 99%
“…In [9], we present the first steps of our work showing the utility of DNS features in the identification of domain activities. This presents a passive DNS security monitoring framework called DNSSM whose architecture for DNS data capture (see Figure 1) is based on the technique of Weimer [14].…”
Section: Early Phase Of Researchmentioning
confidence: 99%