Effectiveness of DNS-Based Security Approaches in Large-Scale Networks
Title | Effectiveness of DNS-Based Security Approaches in Large-Scale Networks |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Janbeglou, M., Naderi, H., Brownlee, N. |
Conference Name | Advanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference on |
Date Published | May |
ISBN Number | 978-1-4799-2653-4 |
Keywords | botnets, computer network security, content delivery networks, Databases, DNS, DNS-based security approaches, domain name system, Educational institutions, Electronic mail, Internet, Internet protocol, IP networks, large-scale network, large-scale networks, load balancers, malicious activities, network measurement, passive monitoring, phishing, Ports (Computers), Protocols, Servers, spamming, statistical analysis |
Abstract | The Domain Name System (DNS) is widely seen as a vital protocol of the modern Internet. For example, popular services like load balancers and Content Delivery Networks heavily rely on DNS. Because of its important role, DNS is also a desirable target for malicious activities such as spamming, phishing, and botnets. To protect networks against these attacks, a number of DNS-based security approaches have been proposed. The key insight of our study is to measure the effectiveness of security approaches that rely on DNS in large-scale networks. For this purpose, we answer the following questions, How often is DNS used? Are most of the Internet flows established after contacting DNS? In this study, we collected data from the University of Auckland campus network with more than 33,000 Internet users and processed it to find out how DNS is being used. Moreover, we studied the flows that were established with and without contacting DNS. Our results show that less than 5 percent of the observed flows use DNS. Therefore, we argue that those security approaches that solely depend on DNS are not sufficient to protect large-scale networks. |
URL | https://ieeexplore.ieee.org/document/6844690 |
DOI | 10.1109/WAINA.2014.87 |
Citation Key | 6844690 |
- large-scale network
- statistical analysis
- spamming
- Servers
- Protocols
- Ports (Computers)
- Phishing
- passive monitoring
- network measurement
- malicious activities
- load balancers
- large-scale networks
- botnets
- IP networks
- Internet Protocol
- internet
- Electronic mail
- Educational institutions
- domain name system
- DNS-based security approaches
- DNS
- Databases
- content delivery networks
- computer network security