首页> 外文期刊>電子情報通信学会技術研究報告 >Detection of Host Name Harvesting Attack in PTR Resource Record Based DNS Query Packet Traffic
【24h】

Detection of Host Name Harvesting Attack in PTR Resource Record Based DNS Query Packet Traffic

机译:基于PTR资源记录的DNS查询数据包流量中主机名收集攻击的检测

获取原文
获取原文并翻译 | 示例
           

摘要

We statistically investigated the total inbound PTR resource record (RR) based DNS query request packet traffic to the top domain DNS server in a university campus network through January 1st to December 31st, 2009. The obtained results are: (1) We observed fourteen host name harvesting (HnH) attacks that we can observe rapid decreases in the unique source IP address based entropy of the inbound PTR RR based the DNS query packet traffic and significant increases in the unique DNS query keyword based one. (2) We found the consecutive and random IP addresses in the PTR RR based DNS query request packet traffic through the days of January 8th and 21st, 2009, respectively. Also (3), we calculated Euclidian distances between the observed IP address and the last observed IP address as the DNS query keywords and we detected two kinds of HnH attacks by a range of thresholds for 1.0-2.0 and 150.2-210.4. Therefore, these results show that we can detect more easily the inbound HnH attacks by calculating the Euclidian distances among the observed IP addresses in the inbound PTR RR based DNS query request packet traffic.
机译:我们对截至2009年1月1日至12月31日到大学校园网络中顶级域DNS服务器的基于总入站PTR资源记录(RR)的DNS查询请求数据包流量进行了统计调查。获得的结果是:(1)我们观察到14个主机名称收获(HnH)攻击,我们可以观察到基于DNS查询数据包流量的入站PTR RR的基于唯一源IP地址的熵迅速下降,而基于DNS查询数据包流量的熵急剧增加。 (2)我们分别在2009年1月8日和21日发现基于PTR RR的DNS查询请求数据包流量中的连续IP地址和随机IP地址。同样,(3),我们将观察到的IP地址和最后观察到的IP地址之间的欧几里得距离作为DNS查询关键字,并且我们以1.0-2.0和150.2-210.4的阈值范围检测到两种HnH攻击。因此,这些结果表明,通过计算基于入站PTR RR的DNS查询请求数据包流量中观察到的IP地址之间的欧几里得距离,我们可以更轻松地检测出入站HnH攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号