Assessing the Real-World Dynamics of DNS

  • Andreas Berger
  • Eduard Natale
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7189)


The DNS infrastructure is a key component of the Internet and is thus used by a multitude of services, both legitimate and malicious. Recently, several works demonstrated that malicious DNS activity usually exhibits observable dynamics that may be exploited for detection and mitigation. Clearly, reliable differentiation requires legitimate activity to not show these dynamics. In this paper, we show that this is often not the case, and propose a set of DNS stability metrics that help to efficiently categorize the DNS activity of a diverse set of Internet sites.


Stable Mapping Bloom Filter Domain Name System Malicious Activity Content Distribution Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Antonakakis, M., Perdisci, R., Dagon, D., Lee, W., Feamster, N.: Building a dynamic reputation system for DNS. In: Proc. of USENIX Security, Berkeley, CA (2010)Google Scholar
  2. 2.
    Antonakakis, M., Perdisci, R., Lee, W., Vasiloglou, N., Dagon, D.: Detecting malware domains at the upper DNS hierarchy. In: USENIX Security, Berkeley, CA (2011)Google Scholar
  3. 3.
    Bilge, L., Kirda, E., Kruegel, C., Balduzzi, M.: EXPOSURE: Finding malicious domains using passive DNS analysis. In: Proc. of NDSS, San Diego, CA (2011)Google Scholar
  4. 4.
    Bloom, B.H.: Space/Time trade-offs in hash coding with allowable errors. Communications of the ACM 13, 422–426 (1970)CrossRefzbMATHGoogle Scholar
  5. 5.
    Hao, S., Feamster, N., Pandrangi, R.: An internet wide view into DNS lookup patterns. Tech. rep., VeriSign Incorporated (June 2010)Google Scholar
  6. 6.
    Hu, X., Knysz, M., Shin, K.G.: Measurement and analysis of global IP-usage patterns of fast-flux botnets. In: Proc. of INFOCOM, Shanghai, China, pp. 2633–2641 (April 2011)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2012

Authors and Affiliations

  • Andreas Berger
    • 1
  • Eduard Natale
    • 1
  1. 1.FTW Telecommunications Research Center ViennaAustria

Personalised recommendations