【24h】

Characterizing large DNS traces using graphs

机译:使用图形表征大型DNS跟踪

获取原文
获取原文并翻译 | 示例

摘要

The increasing deployment of overlay networks that rely on DNS tricks has led to added interest in examining DNS traffic. In this paper we report on a characterization of DNS traffic gathered over a period of several weeks at Internet Gateway Routers (IGRs) in the AT&T Common Backbone. The characterization is carried out using several novel techniques to identify clients, local DNS servers, and authoritative DNS servers. Our techniques include passive and active measurements, graph-based analysis, examination of outliers, and explicit checks against data obtained from several external sources. Our contribution is the reduction of a very large data set (over 1 terabyte of raw data) into a significantly smaller representation that is ideally suited for answering protocol-specific semantic queries quickly. After categorizing the addresses, we use the network aware clustering technique to group local DNS servers. By juxtaposing the DNS server clusters with clusters formed by Web clients obtained froma large portal Web site, we determine the distribution of identified DNS servers in busy clusters. A variety of applications are examined, ranging from identifying suspected zombies to helping Content Distribution Networks in mapping location of DNS servers.
机译:依靠DNS技巧的覆盖网络的部署不断增加,引起了对检查DNS流量的更多兴趣。在本文中,我们报告了在AT&T通用骨干网中的Internet网关路由器(IGR)上收集了数周的DNS流量的特征。使用几种新颖的技术来进行表征,以识别客户端,本地DNS服务器和权威DNS服务器。我们的技术包括被动和主动测量,基于图形的分析,离群值检查以及针对从多个外部来源获得的数据的显式检查。我们的贡献是将非常大的数据集(超过1 TB的原始数据)简化为非常小的表示形式,非常适合快速回答特定于协议的语义查询。将地址分类后,我们使用网络感知群集技术对本地DNS服务器进行分组。通过将DNS服务器群集与从大型门户网站获得的Web客户端形成的群集并置,我们确定繁忙的群集中已标识的DNS服务器的分布。检查了各种应用程序,从识别可疑的僵尸到帮助Content Distribution Networks映射DNS服务器的位置。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号