This thesis explores four research areas that are examined using DNS traffic analysis. The tools used for this analysis are presented first. The four topics examined are domain mapping, response time of anti-phishing block lists to find the phishing sites, automated identification of malicious fast-flux hosting domains, and identification of distributed denial of service attacks. The first three approaches yielded successful results, and the fourth yields primarily negative lessons for using DNS traffic analysis in such a scenario. Much of the analysis concerns the anti-phishing response time, which has yielded tentative results. It is found that there is significant overlap between the automatically identified fast-flux sites and those sit...
The Domain Name System (DNS) is a critical part of the Internet. This paper analyzes methods for pas...
Master of ScienceDepartment of Computer ScienceEugene VassermanThe first step of accessing any ...
Master of ScienceDepartment of Computer ScienceEugene VassermanThe first step of accessing any ...
This thesis explores four research areas that are examined using DNS traffic analysis. The tools use...
The domain name service (DNS) plays an important role in the operation of the Internet, providing a ...
The domain name service (DNS) plays an important role in the operation of the Internet, providing a ...
A wide range of malicious activities rely on the domain name service (DNS) to manage their large, di...
This thesis examines a dataset spanning 21 months, containing 3,5 billion DNS packets. Traffic on TC...
peer reviewedIn this paper we present an architecture for large scale DNS monitoring. The analysis o...
We statistically investigated on the unusual big DNS resolution traffic toward the top domain DNS se...
Domain blacklists are widely-used in security research. However, given their proprietary nature, the...
Targeted security threats from resourceful adversaries have become a constant phenomenon on the Inte...
The Domain Name System (DNS) protocol is a fundamental part of Internet activities that can be abuse...
(English) Botnets are generally recognized as one of the most challenging threats on the Internet to...
The performance and operational characteristics of the DNS pro-tocol are of deep interest to the res...
The Domain Name System (DNS) is a critical part of the Internet. This paper analyzes methods for pas...
Master of ScienceDepartment of Computer ScienceEugene VassermanThe first step of accessing any ...
Master of ScienceDepartment of Computer ScienceEugene VassermanThe first step of accessing any ...
This thesis explores four research areas that are examined using DNS traffic analysis. The tools use...
The domain name service (DNS) plays an important role in the operation of the Internet, providing a ...
The domain name service (DNS) plays an important role in the operation of the Internet, providing a ...
A wide range of malicious activities rely on the domain name service (DNS) to manage their large, di...
This thesis examines a dataset spanning 21 months, containing 3,5 billion DNS packets. Traffic on TC...
peer reviewedIn this paper we present an architecture for large scale DNS monitoring. The analysis o...
We statistically investigated on the unusual big DNS resolution traffic toward the top domain DNS se...
Domain blacklists are widely-used in security research. However, given their proprietary nature, the...
Targeted security threats from resourceful adversaries have become a constant phenomenon on the Inte...
The Domain Name System (DNS) protocol is a fundamental part of Internet activities that can be abuse...
(English) Botnets are generally recognized as one of the most challenging threats on the Internet to...
The performance and operational characteristics of the DNS pro-tocol are of deep interest to the res...
The Domain Name System (DNS) is a critical part of the Internet. This paper analyzes methods for pas...
Master of ScienceDepartment of Computer ScienceEugene VassermanThe first step of accessing any ...
Master of ScienceDepartment of Computer ScienceEugene VassermanThe first step of accessing any ...