2010
DOI: 10.1007/978-3-642-15512-3_2
|View full text |Cite
|
Sign up to set email alerts
|

A Centralized Monitoring Infrastructure for Improving DNS Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
43
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 52 publications
(58 citation statements)
references
References 8 publications
0
43
0
Order By: Relevance
“…Our work, on the other hand, tracks DNS records of newly registered domains to infer spatial and temporal characteristics. Anax scanned the recursive servers to find out anomaly in the cached records and detect poisoning attacks [1]. In contrast, we monitor the records in the zones' authoritative servers to discover the characteristics in the malicious domains' registration.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Our work, on the other hand, tracks DNS records of newly registered domains to infer spatial and temporal characteristics. Anax scanned the recursive servers to find out anomaly in the cached records and detect poisoning attacks [1]. In contrast, we monitor the records in the zones' authoritative servers to discover the characteristics in the malicious domains' registration.…”
Section: Related Workmentioning
confidence: 99%
“…The rate at which new domains appear makes quickly developing a reputation for these domains particularly challenging: in our analysis, we find that over tens of thousands of new domains are registered every day. Existing DNS reputation systems use the characteristics of DNS lookups from resolvers that look up a domain to distinguish legitimate from malicious domains [1,2]. Unfortunately, these systems must observe a significant volume of DNS lookups before determining the reputation for a domain, which only occurs after compromise has taken place.…”
Section: Introductionmentioning
confidence: 99%
“…Observing cache changes in multiple recursive servers is helpful in detecting cache poisoning attacks [24]. However, all the above approaches, except [21] which is mainly manual, require additional sources of information, which is gathered actively using common tools like dig or whois.…”
Section: Related Workmentioning
confidence: 99%
“…Statistical evaluation is used in [2], respectively whitelists and classifiers are referred to, to detect anomalous patterns in RR data for rervealing poisoning attacks. The authors in [3] describe a large-scale passive DNS tool, where features are used to detect anomalies, as for example euclidean distances between entries to identify changes in the lifetimes of domains, etc.…”
Section: Related Workmentioning
confidence: 99%