Proceedings of the Conference on Internet Measurement Conference - IMC '03 2003
DOI: 10.1145/948213.948216
|View full text |Cite
|
Sign up to set email alerts
|

Inferring relative popularity of internet applications by actively querying DNS caches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2005
2005
2014
2014

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…Such efforts would be especially useful if a media server with many audio and video encoding rates and choices were specifically studied. Existing techniques that actively query DNS caches such as in Wills et al [2003] could provide complementary information about the popularity of Web sites with stored audio and video.…”
Section: Future Workmentioning
confidence: 99%
“…Such efforts would be especially useful if a media server with many audio and video encoding rates and choices were specifically studied. Existing techniques that actively query DNS caches such as in Wills et al [2003] could provide complementary information about the popularity of Web sites with stored audio and video.…”
Section: Future Workmentioning
confidence: 99%
“…During this stage, a detection mechanism is provided to analyze DNS traffic and detect possible communication instabilities and DNS anomalies (Choi et al, 2007;Villamarín-Salomón and Brustoloni, 2008). It was shown in Cranor et al (2001) and Wills et al (2003) that DNS queries provide information regarding botnet existence and help find the location of the C&C server. Normally bots communicate within a single administrative domain and it is easy to measure the relationship between the bots and the C&C mechanism by analyzing different domain attributes such as the lifetime of the domain, time to live (TTL) of the query, page ranking of domains, and how frequently a query is applied.…”
Section: Botnet Detection Based On the Dns Protocolmentioning
confidence: 99%
“…P2P has become a major source of illegal activities of content sharing, due to a lack of Modeling botnet propagation using time zones Ability to predict future botnets Focusing on centralized C&C (Wills et al, 2003) Botnet detection by inferring the usage pattern of applications…”
Section: Botnet Detection Based On P2p Protocolsmentioning
confidence: 99%
“…Grangeia [11] provides an excellent review of how to remotely inspect a cache for evidence of a specific lookup (e.g., www.nytimes.com). Remote cache inspection of this type has been used for a number of measurement studies that include, for example, inferring the relative popularity of websites [12] and tracking malware infections [13]. In contrast, in this paper we explore how DNS prefetching amplifies new privacy threats, allowing one to gain far more insights than these prior techniques envisioned.…”
Section: Related Workmentioning
confidence: 99%