Investigating DNS traffic anomalies for malicious activities (original) (raw)
Related papers
Detection of malicious payload distribution channels in DNS
2014 IEEE International Conference on Communications (ICC), 2014
Detecting Algorithmically Generated Domain-Flux Attacks With DNS Traffic Analysis
IEEE/ACM Transactions on Networking, 2012
Detecting and Preventing the Malicious System based on DNS Analysis
Detecting Botnet Activities Based on Abnormal DNS traffic
Arxiv preprint arXiv: …, 2009
Leveraging client-side DNS failure patterns to identify malicious behaviors
2015 IEEE Conference on Communications and Network Security (CNS), 2015
On Botnets That Use DNS for Command and Control
2011 Seventh European Conference on Computer Network Defense, 2011
Characterization of Covert Channels in DNS
2014 6th International Conference on New Technologies, Mobility and Security (NTMS), 2014
Fingerprinting Internet DNS Amplification DDoS Activities
2014 6th International Conference on New Technologies, Mobility and Security (NTMS), 2014
A survey of botnet detection based on DNS
Kamal Alieyan, Dr. Ahmed Manasrah
Analysis and Investigation of Malicious DNS Queries Using CIRA-CIC-DoHBrw-2020 Dataset
An empirical reexamination of global DNS behavior
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, 2013
Detecting Internet Abuse by Analyzing Passive DNS Traffic: A Survey of Implemented Systems
IEEE Communications Surveys & Tutorials, 2018
Classifying DNS Tunneling Tools For Malicious DoH Traffic
2021 IEEE Symposium Series on Computational Intelligence (SSCI), 2021
Detecting Malicious Activity With DNS Backscatter Over Time
IEEE/ACM Transactions on Networking, 2017
An Overview of DDoS attacks based on DNS
DomainProfiler: toward accurate and early discovery of domain names abused in future
International Journal of Information Security
A framework for DNS based detection and mitigation of malware infections on a network
2011 Information Security for South Africa, 2011
A Novel Approach for Detecting DGA-Based Botnets in DNS Queries Using Machine Learning Techniques
Journal of Computer Networks and Communications, 2021
Anomaly Behavior Analysis of DNS Protocol
J. Internet Serv. Inf. Secur., 2015
Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers
Sensors, 2016
Exposing Chinese DNS Exploitation
Leveraging China’s Great Cannon & Great Firewall – Against DNS “Critical Infrastructure” A New APT?, 2024
Threat Analysis of the Domain Name System (DNS)
2004
Detecting algorithmically generated malicious domain names
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 2010
Winning with DNS Failures: Strategies for Faster Botnet Detection
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2012
DNS Security Control Measures: A heuristic-based Approach to Identify Real-time incidents
Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces
2009 Annual Computer Security Applications Conference, 2009
Corrupted DNS resolution paths: The rise of a malicious resolution authority
2008
DNS query failure and algorithmically generated domain-flux detection
International Conference on Frontiers of Communications, Networks and Applications (ICFCNA 2014 - Malaysia), 2014