Visible to the public Effectiveness of DNS-Based Security Approaches in Large-Scale Networks

TitleEffectiveness of DNS-Based Security Approaches in Large-Scale Networks
Publication TypeConference Paper
Year of Publication2014
AuthorsJanbeglou, M., Naderi, H., Brownlee, N.
Conference NameAdvanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference on
Date PublishedMay
ISBN Number978-1-4799-2653-4
Keywordsbotnets, computer network security, content delivery networks, Databases, DNS, DNS-based security approaches, domain name system, Educational institutions, Electronic mail, Internet, Internet protocol, IP networks, large-scale network, large-scale networks, load balancers, malicious activities, network measurement, passive monitoring, phishing, Ports (Computers), Protocols, Servers, spamming, statistical analysis
Abstract

The Domain Name System (DNS) is widely seen as a vital protocol of the modern Internet. For example, popular services like load balancers and Content Delivery Networks heavily rely on DNS. Because of its important role, DNS is also a desirable target for malicious activities such as spamming, phishing, and botnets. To protect networks against these attacks, a number of DNS-based security approaches have been proposed. The key insight of our study is to measure the effectiveness of security approaches that rely on DNS in large-scale networks. For this purpose, we answer the following questions, How often is DNS used? Are most of the Internet flows established after contacting DNS? In this study, we collected data from the University of Auckland campus network with more than 33,000 Internet users and processed it to find out how DNS is being used. Moreover, we studied the flows that were established with and without contacting DNS. Our results show that less than 5 percent of the observed flows use DNS. Therefore, we argue that those security approaches that solely depend on DNS are not sufficient to protect large-scale networks.

URLhttps://ieeexplore.ieee.org/document/6844690
DOI10.1109/WAINA.2014.87
Citation Key6844690