2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC) 2013
DOI: 10.1109/iwcmc.2013.6583721
|View full text |Cite
|
Sign up to set email alerts
|

Graph theoretical models of DNS traffic

Abstract: Abstract-The DNS is one of the core protocols on which the Internet is built upon. Hidden behind higher-level protocols such as email and web, it carries valuable information that can be exploited for understanding trends and preferences of the Internet community.In this paper we propose novel methodologies for modelling DNS traffic that allow Internet domains, DNS resolvers and their interactions to be represented effectively by means of graphs. DNS traffic collected at ".it" ccTLD DNS domain servers has been… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…Internet traffic volume distribution over domains follows a power-law [69], i.e., the Alexa top domains accumulate a large fraction of the overall internet traffic. Thus, blocking those domains not only has large collateral damage in terms of number of webs, but also traffic volume.…”
Section: Censor Dns-blocking Strategymentioning
confidence: 99%
“…Internet traffic volume distribution over domains follows a power-law [69], i.e., the Alexa top domains accumulate a large fraction of the overall internet traffic. Thus, blocking those domains not only has large collateral damage in terms of number of webs, but also traffic volume.…”
Section: Censor Dns-blocking Strategymentioning
confidence: 99%
“…A typical-but by no means unique [24]-DNS graph is undirected and bipartite, connecting fully qualified domain names to their IP addresses [1], [16], [25]. The basic idea remains similar for server-side applications, although these allow further separating the "inside" (origins of queries) and "outside" (targets of queries) traffic passing through DNS servers, routers, or related machinery [26], [27], [28], [29].…”
Section: B Dns Graphs In Briefmentioning
confidence: 99%
“…Similarly, in [ 44 ], the authors propose to use social structures to detect DDoS attack on DNS server, and present some insights about this approach. As another example, [ 45 ] studies the bipartite graph that stems from an ISP network, concluding that these kinds of graphs follow a heavy tailored distribution. Despite being similar, none of these works have exploited IP to domain name interactions to detect flood attacks as we do.…”
Section: Related Workmentioning
confidence: 99%