Abstract. We collected DNS responses at the University of Auckland Internet gateway in an SQL database, and analyzed them to detect unusual behaviour. Our DNS response data have included typo squatter domains, fast flux domains and domains being (ab)used by spammers. We observe that current attempts to reduce spam have greatly increased the number of A records being resolved. We also observe that the data locality of DNS requests diminishes because of domains advertised in spam.
The DNS is a fundamental service that has been repeatedly attacked and abused. DNS manipulation is a...
<p>In the process of categorizing malicious domains, distinguishing between suspicious and benign na...
Abstract — We statistically investigated on the unusual big DNS resolution traffic toward the top do...
The Domain Name System (DNS) is a critical part of the Internet. This paper analyzes methods for pas...
The domain name service (DNS) plays an important role in the operation of the Internet, providing a ...
The domain name service (DNS) plays an important role in the operation of the Internet, providing a ...
Targeted security threats from resourceful adversaries have become a constant phenomenon on the Inte...
This paper analyzes the DNS lookup patterns from a large authoritative top-level domain server and c...
The performance and operational characteristics of the DNS pro-tocol are of deep interest to the res...
A wide range of malicious activities rely on the domain name service (DNS) to manage their large, di...
Abstract: The system log (syslog) files of the E-mail and the DNS cache servers in Kumamoto Universi...
Attackers often use URLs to advertise scams or propagate mal-ware. Because the reputation of a domai...
Abstract: The system log (syslog) files of the E-mail and the DNS cache servers in Kumamoto Universi...
Attackers often use URLs to advertise scams or propagate mal-ware. Because the reputation of a domai...
We statistically investigated on the unusual big DNS resolution traffic toward the top domain DNS se...
The DNS is a fundamental service that has been repeatedly attacked and abused. DNS manipulation is a...
<p>In the process of categorizing malicious domains, distinguishing between suspicious and benign na...
Abstract — We statistically investigated on the unusual big DNS resolution traffic toward the top do...
The Domain Name System (DNS) is a critical part of the Internet. This paper analyzes methods for pas...
The domain name service (DNS) plays an important role in the operation of the Internet, providing a ...
The domain name service (DNS) plays an important role in the operation of the Internet, providing a ...
Targeted security threats from resourceful adversaries have become a constant phenomenon on the Inte...
This paper analyzes the DNS lookup patterns from a large authoritative top-level domain server and c...
The performance and operational characteristics of the DNS pro-tocol are of deep interest to the res...
A wide range of malicious activities rely on the domain name service (DNS) to manage their large, di...
Abstract: The system log (syslog) files of the E-mail and the DNS cache servers in Kumamoto Universi...
Attackers often use URLs to advertise scams or propagate mal-ware. Because the reputation of a domai...
Abstract: The system log (syslog) files of the E-mail and the DNS cache servers in Kumamoto Universi...
Attackers often use URLs to advertise scams or propagate mal-ware. Because the reputation of a domai...
We statistically investigated on the unusual big DNS resolution traffic toward the top domain DNS se...
The DNS is a fundamental service that has been repeatedly attacked and abused. DNS manipulation is a...
<p>In the process of categorizing malicious domains, distinguishing between suspicious and benign na...
Abstract — We statistically investigated on the unusual big DNS resolution traffic toward the top do...