It is a necessity
for effective network management to be aware of the activities taking place on
computer networks. Network managers should always be alarmed about what is
happening now, what might be, or what will be in the future for the sake of
network. To gather information about a computer system or a network, attackers
mostly exploit networking tools to gain some privileges and login systems.
Penetration testers also use these tools to gather information about systems,
but their main concern is to discover the vulnerabilities of the system, and to
find out what kind of measures could be applied to make the system more
resistant to these vulnerabilities. In this study, we propose an abnormal DNS
traffic identification method via utilizing Hurst parameter estimation. To do
so, we employ DNS information gathering tools in Kali Linux to generate
abnormal DNS flows. Then, we estimate its self-similarity degree to compare the
differences between normal DNS traffic flows and abnormal ones. Obtained
results show that abnormal DNS traffic show higher self-similarity degrees.
Another interesting finding is that abnormal DNS traffic shows different
distribution characteristic.
Primary Language | English |
---|---|
Subjects | Engineering |
Journal Section | Araştırma Articlessi |
Authors | |
Publication Date | July 31, 2018 |
Published in Issue | Year 2018 Volume: 6 Issue: 3 |
All articles published by BAJECE are licensed under the Creative Commons Attribution 4.0 International License. This permits anyone to copy, redistribute, remix, transmit and adapt the work provided the original work and source is appropriately cited.