【24h】

Characterizing Dark DNS Behavior

机译:表征黑暗DNS行为

获取原文
获取原文并翻译 | 示例

摘要

Security researchers and network operators increasingly rely on information gathered from honeypots and sensors deployed on dark-nets, or unused address space, for attack detection. While the attack traffic gleaned from such deployments has been thoroughly scrutinized, little attention has been paid to DNS queries targeting these addresses. In this paper, we introduce the concept of dark DNS, the DNS queries associated with darknet addresses, and characterize the data collected from a large operational network by our dark DNS sensor. We discuss the implications of sensor evasion via DNS reconnaissance and emphasize the importance of reverse DNS authority when deploying darknet sensors to prevent attackers from easily evading monitored darknets. Finally, we present honeydns, a tool that complements existing network sensors and low-interaction honeypots by providing simple DNS services.
机译:安全研究人员和网络运营商越来越依赖从蜜罐和部署在暗网或未使用的地址空间上的传感器收集的信息来进行攻击检测。尽管已经仔细检查了从此类部署中收集的攻击流量,但很少关注针对这些地址的DNS查询。在本文中,我们介绍了暗DNS的概念,与暗网地址相关联的DNS查询,并描述了由我们的暗DNS传感器从大型运营网络中收集的数据。我们讨论了通过DNS侦查逃避传感器的含义,并强调了在部署暗网传感器时防止DNS反向授权的重要性,以防止攻击者轻易逃避受监控的暗网。最后,我们介绍了honeydns,该工具通过提供简单的DNS服务来补充现有的网络传感器和低交互性蜜罐。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号