2016
DOI: 10.1007/978-3-319-45719-2_9
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Network Security Through Active DNS Datasets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
46
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 53 publications
(47 citation statements)
references
References 15 publications
0
46
0
Order By: Relevance
“…Active DNS: We also utilize an active DNS (ADN S) dataset, which we obtain daily from the Active DNS project [24]. Since the duration of this dataset is less than a year, it does not have a complete temporal overlap with our PDN S dataset.…”
Section: Datasetsmentioning
confidence: 99%
“…Active DNS: We also utilize an active DNS (ADN S) dataset, which we obtain daily from the Active DNS project [24]. Since the duration of this dataset is less than a year, it does not have a complete temporal overlap with our PDN S dataset.…”
Section: Datasetsmentioning
confidence: 99%
“…However, if this is not the case in the future, it would be easy to find alternatives. Given that the important features we extract depend more on the temporal registration information than the contact details of the registrant, we could replace our WHOIS features with DNS tracking systems like Active DNS [23] or the Alembic system [25].…”
Section: Whois and Gdprmentioning
confidence: 99%
“…Legitimate use-cases for CNAME chains must ensure the length is supported by all DNS resolvers, if they want to support all users. We inspected the Active DNS [21] data set to identify benign chains. We extracted the CNAME entries from 2017-10-05 to reconstruct the longest benign chains, which consists of eight elements (seven CNAMEs and one final RR).…”
Section: Recursion Depth Limitmentioning
confidence: 99%