Anomaly detection of domain name system (DNS) query traffic at top level domain servers

نویسندگان

  • Zheng Wang
  • Shian-Shyong Tseng
چکیده

Major network events can be reflected on domain name system (DNS) traffic at the top level server on the DNS hierarchical structure. This paper pursues a novel approach to detect the DNS traffic anomaly of 5.19 events in China at CN top level domain server using covariance analysis. We normalize, expand and average the covariance changes for different length of time slice to enhance the robustness of detection. Feature anomaly is detected based on clustering analysis of covariance change anomaly. To improve the accuracy and reduce the complexity of the k –means algorithm, an initial cluster selection technique is proposed and its performance is analyzed. Transient anomaly and time span anomaly are defined and an efficient real time approximating algorithm is derived. We use an incremental computational method for covariance matrix. The computation and transmission scheme of feature values are analyzed and the process of the detecting algorithm is given. The traffic detecting results of 5.19 event shows that the approach can accurately detect the network anomaly.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers

The Domain Name System (DNS) is a critical infrastructure of any network, and, not surprisingly a common target of cybercrime. There are numerous works that analyse higher level DNS traffic to detect anomalies in the DNS or any other network service. By contrast, few efforts have been made to study and protect the recursive DNS level. In this paper, we introduce a novel abstraction of the recur...

متن کامل

Behavior of DNS' Top Talkers, a .com/.net View

This paper provides the first systematic study of DNS data taken from one of the 13 servers for the .com/.net registry. DNS’ generic Top Level Domains (gTLDs) such .com and .net serve resolvers from throughout the Internet and respond to billions of DNS queries every day. This study uses gTLD data to characterize the DNS resolver population and profile DNS query types. The results show a small ...

متن کامل

SCALABLE TECHNIQUES FOR ANOMALY DETECTION A Dissertation by SANDEEP YADAV

Computer networks are constantly being attacked by malicious entities for various reasons. Network based attacks include but are not limited to, Distributed Denial of Service (DDoS), DNS based attacks, Cross-site Scripting (XSS) etc. Such attacks have exploited either the network protocol or the end-host software vulnerabilities for perpetration. Current network traffic analysis techniques empl...

متن کامل

Combating Malicious DNS Tunnel

The Domain Name System (DNS) is a fundamental Internet infrastructure, which resolves billions of queries per day in support of global communications and commerce. The most common use of DNS is to map human-friendly domain names to machine-readable IP addresses.The DNS is designed based on the client-server model where stub resolver at the client side originates DNS query for some query name an...

متن کامل

DNS Based Detection of SSH Dictionary Attack in Campus Network

We statistically investigated the DNS query access traffic from a university campus network toward the top domain DNS (tDNS) through March 14th, 2009, when the hosts in the campus network were under inbound SSH dictionary attack. The interesting results are obtained, as follows: (1) the several hosts generated the DNS query packet traffic, taking a rate of more than 1,000 hour−1, through 07:30-...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012