Detecting Malicious Activity With DNS Backscatter Over Time (original) (raw)

Detection of malicious payload distribution channels in DNS

ِAmr Y O U S S E F Bakla

2014 IEEE International Conference on Communications (ICC), 2014

View PDFchevron_right

Investigating DNS traffic anomalies for malicious activities

Fyodor Bom

View PDFchevron_right

Fingerprinting Internet DNS Amplification DDoS Activities

Claude Fachkha

2014 6th International Conference on New Technologies, Mobility and Security (NTMS), 2014

View PDFchevron_right

Analysis and Investigation of Malicious DNS Queries Using CIRA-CIC-DoHBrw-2020 Dataset

Mohammad Al-Fawa'reh

View PDFchevron_right

An empirical reexamination of global DNS behavior

Shalini Ghosh

Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, 2013

View PDFchevron_right

Leveraging client-side DNS failure patterns to identify malicious behaviors

Antonio Nucci

2015 IEEE Conference on Communications and Network Security (CNS), 2015

View PDFchevron_right

DomainProfiler: toward accurate and early discovery of domain names abused in future

Shigeki Goto

International Journal of Information Security

View PDFchevron_right

Detecting Internet Abuse by Analyzing Passive DNS Traffic: A Survey of Implemented Systems

Amine Boukhtouta

IEEE Communications Surveys & Tutorials, 2018

View PDFchevron_right

Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers

Luis Trejo

Sensors, 2016

View PDFchevron_right

REMaDD: Resource-Efficient Malicious Domains Detector in Large-Scale Networks

gilad rosenthal

IEEE Access, 2020

View PDFchevron_right

Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces

Wenke Le

2009 Annual Computer Security Applications Conference, 2009

View PDFchevron_right

A framework for DNS based detection and mitigation of malware infections on a network

Barry Irwin

2011 Information Security for South Africa, 2011

View PDFchevron_right

Mining agile DNS traffic using graph analysis for cybercrime detection

Wilfried Gansterer

Computer Networks, 2016

View PDFchevron_right

DNS Based Detection of Spam Bots and Host Search Activity

Dennis Ludena

2008

View PDFchevron_right

Detecting algorithmically generated malicious domain names

SANDEEP KUMAR YADAV

Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 2010

View PDFchevron_right

Classifying DNS Tunneling Tools For Malicious DoH Traffic

Simone Ludwig

2021 IEEE Symposium Series on Computational Intelligence (SSCI), 2021

View PDFchevron_right

Detecting Botnet Activities Based on Abnormal DNS traffic

Dr. Ahmed Manasrah

Arxiv preprint arXiv: …, 2009

View PDFchevron_right

Detecting and Preventing the Malicious System based on DNS Analysis

Ashok Paranjothi

View PDFchevron_right

Why so abnormal? Detecting domains receiving anomalous surge traffic in a monitored network

Prem Sankar

Journal of Intelligent & Fuzzy Systems, 2017

View PDFchevron_right

DNS Security Control Measures: A heuristic-based Approach to Identify Real-time incidents

Joao Afonso

View PDFchevron_right

A Novel Approach for Detecting DGA-Based Botnets in DNS Queries Using Machine Learning Techniques

fatemeh arabgol

Journal of Computer Networks and Communications, 2021

View PDFchevron_right

CyberProbe: Towards Internet-Scale Active Detection of Malicious Servers

Antonio Nappa

Proceedings 2014 Network and Distributed System Security Symposium, 2014

View PDFchevron_right

Feature Engineering and Machine Learning Model Comparison for Malicious Activity Detection in the DNS-Over-HTTPS Protocol

Ram Basnet

IEEE Access, 2021

View PDFchevron_right

Detecting Algorithmically Generated Domain-Flux Attacks With DNS Traffic Analysis

SANDEEP KUMAR YADAV

IEEE/ACM Transactions on Networking, 2012

View PDFchevron_right

Malicious domain detection based on DNS query using Machine Learning

WARSE The World Academy of Research in Science and Engineering

World Academy of Research in Science and Engineering , 2020

View PDFchevron_right

Enhancing Cybersecurity Through Clustering Analysis Of DNS Queries

Mohamed Moughit

2023

View PDFchevron_right

An empirical study of spam traffic and the use of DNS black lists

Jaeyeon Jung

Proceedings of the 4th ACM SIGCOMM conference on Internet measurement - IMC '04, 2004

View PDFchevron_right

Winning with DNS Failures: Strategies for Faster Botnet Detection

SANDEEP KUMAR YADAV

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2012

View PDFchevron_right

Tracking and Characterizing Botnets Using Automatically Generated Domains

Lorenzo Cavallaro

View PDFchevron_right