2014 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA) (2014)
May 13, 2014 to May 16, 2014
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/WAINA.2014.87
The Domain Name System (DNS) is widely seen as a vital protocol of the modern Internet. For example, popular services like load balancers and Content Delivery Networks heavily rely on DNS. Because of its important role, DNS is also a desirable target for malicious activities such as spamming, phishing, and botnets. To protect networks against these attacks, a number of DNS-based security approaches have been proposed. The key insight of our study is to measure the effectiveness of security approaches that rely on DNS in large-scale networks. For this purpose, we answer the following questions, How often is DNS used? Are most of the Internet flows established after contacting DNS? In this study, we collected data from the University of Auckland campus network with more than 33,000 Internet users and processed it to find out how DNS is being used. Moreover, we studied the flows that were established with and without contacting DNS. Our results show that less than 5 percent of the observed flows use DNS. Therefore, we argue that those security approaches that solely depend on DNS are not sufficient to protect large-scale networks.
large-scale network, DNS, passive monitoring, statistical analysis, network measurement
M. Janbeglou, H. Naderi and N. Brownlee, "Effectiveness of DNS-Based Security Approaches in Large-Scale Networks," 2014 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA), BC, Canada, 2014, pp. 524-529.