<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Balkan Journal of Electrical and Computer Engineering</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">2147-284X</issn>
                                        <issn pub-type="epub">2147-284X</issn>
                                                                                            <publisher>
                    <publisher-name>MUSA YILMAZ</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.17694/bajece.435230</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Engineering</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Mühendislik</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                        <article-title>Identification of abnormal DNS traffic with Hurst parameter</article-title>
                                                                                                                                        </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0001-8265-1736</contrib-id>
                                                                <name>
                                    <surname>Gezer</surname>
                                    <given-names>Ali</given-names>
                                </name>
                                                                    <aff>University of Alabama at Birmingham</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20180731">
                    <day>07</day>
                    <month>31</month>
                    <year>2018</year>
                </pub-date>
                                        <volume>6</volume>
                                        <issue>3</issue>
                                        <fpage>191</fpage>
                                        <lpage>197</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20180621">
                        <day>06</day>
                        <month>21</month>
                        <year>2018</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20180725">
                        <day>07</day>
                        <month>25</month>
                        <year>2018</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2013, Balkan Journal of Electrical and Computer Engineering</copyright-statement>
                    <copyright-year>2013</copyright-year>
                    <copyright-holder>Balkan Journal of Electrical and Computer Engineering</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>It is a necessityfor effective network management to be aware of the activities taking place oncomputer networks. Network managers should always be alarmed about what ishappening now, what might be, or what will be in the future for the sake ofnetwork. To gather information about a computer system or a network, attackersmostly exploit networking tools to gain some privileges and login systems.Penetration testers also use these tools to gather information about systems,but their main concern is to discover the vulnerabilities of the system, and tofind out what kind of measures could be applied to make the system moreresistant to these vulnerabilities. In this study, we propose an abnormal DNStraffic identification method via utilizing Hurst parameter estimation. To doso, we employ DNS information gathering tools in Kali Linux to generateabnormal DNS flows. Then, we estimate its self-similarity degree to compare thedifferences between normal DNS traffic flows and abnormal ones. Obtainedresults show that abnormal DNS traffic show higher self-similarity degrees.Another interesting finding is that abnormal DNS traffic shows differentdistribution characteristic.</p></abstract>
                                                                                    
            
                                                            <kwd-group>
                                                    <kwd>Traffic analysis</kwd>
                                                    <kwd>  DNS protocol</kwd>
                                                    <kwd>  distribution fitting</kwd>
                                                    <kwd>  abnormal traffic detection</kwd>
                                            </kwd-group>
                                                        
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1]	H. Chen, J.H. Cho, and S. Hu, “Quantifying the Security Effectiveness of Firewalls and DMZs”, In Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, ACM, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2]	A. Patel, M. Taghavi, K. Bakhtiyari, and J. Celestino JúNior. &quot;An intrusion detection and prevention system in cloud computing: A systematic review&quot;, Journal of network and computer applications, vol. 36, no. 1 , 2013, pp- 25-41.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3]	U.A. Sandhu, S. Haider, S. Naseer, and O. U. Ateeb, “A survey of intrusion detection &amp; Prevention Techniques”, 2011 International Conference on Information Communication and Managenent IPCSIT, vol. 16, Singapore, 2011, pp. 66-67.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4]	M. Wielorgorshka, and D. O’Brien, DNS Traffic Analysis for Botnet Detection.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5]	C. Hyunsang, H. Lee, H. Lee, and H. Kim. &quot;Botnet detection by monitoring group activities in DNS traffic&quot;, In Computer and Information Technology, 2007. CIT 2007. 7th IEEE International Conference on, 2007, pp. 715-720.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6]	C. Hyunsang, and H. Lee. &quot;Identifying botnets by capturing group activities in DNS traffic&quot;, Computer Networks, vol. 56, no. 1, 2012, pp. 20-33.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7]	M.A. Hussain, H. Jin, Z.A. Hussien,  Z.A. Abduljabbar, S.H. Abbdal, A. İbrahim, “DNS Protection Against Spoofing and Poisoning Attacks”, 3rd International Conference on Information Science and Control Engineering (ICISCE), Beijing China, 2016, pp. 1308-1312.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8]	M. Anagnostopoulos, G. Kambourakis, P. Kopanos, G. Louloudakis, and S. Gritzalis. &quot;DNS amplification attack revisited.&quot; Computers &amp; Security 39, 2013, pp. 475-485.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9]	D. Matthew, Z. Carlos, and H. Thaier, “Penetration Testing: Concepts, Attack Methods and Defense Strategies, Systems”, Applications and Technology Conference (LISAT), 2016 IEEE Long Island, NY USA, 2016.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">[10]	W.G.J. Halfound, S.R. Choudrary, and A. Orson,  “Penetration Testing with Improved Input Vector Identification” , Software Testing Verification and Validation, 2ICST’09, Denver Co, USA, 2009, pp. 346-355.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">[11]	Kali Linux by Offensive Security, https://www.kali.org/,   accessed September 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">[12]	S. Giardano, S. Miduri, M. Pagano, F. Russo, S. Tartarelli, “A wavelet-based approach to the estimation of Hurst parameter for self-similar data”, International Conference on Digital Signal Processing, DSP 97 2, 1997, pp. 479–482.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">[13]	M. Barnsley, “Fractals Everywhere”, Academic Press, San Dieog, 1998.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">[14]	J. Beran, “Statistics for Long Memory Processes”, Chapman &amp; Hall, New York, 1994.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">[15]	V. Paxson, S. Floyd, “Wide area traffic: the failure of Poisson modeling”, IEEE/ACM Transactions on Networking,  vol. 3, no. 3, 1995, pp. 226–244.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">[16]	W.E. Leland, M.S. Taqqu, W. Willinger, D.V. Wilson, “On the self similar nature of Ethernet traffic (extended version)”, IEEE/ACM Transactions on Networking, vol. 2, no. 1, 1994, pp. 1–15.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">[17]	 J. Beran, R. Sherman, M.S. Taqqu, W. Willinger, “Long-range dependence in variable-bit-rate video traffic”, IEEE Transactions Communications, vol. 43, no. 234, 1995, pp. 1566–1579.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">[18]	M.E. Crovella, A. Bestavros, “Self similarity in world wide web traffic: evidence and possible causes”, IEEE/ACM Transactions on Networking, vol. 5, no. 6, 1997, pp. 835–846.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">[19]	D.P. Heyman, T.V. Lakshman, “What are the implications of long-range dependence for VBR-video traffic engineering?”, IEEE/ACM Transactions on Networking, vol. 4, no. 3, 1996, pp. 301–317.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">[20]	E. Masry, “The wavelet transform of stochastic processes with stationary increments and its application to fractional Brownian motion”, IEEE Trans. Inform. Theory, Vol. 39, no. 1, 1993, pp. 260-264.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">[21]	G. Wornell, “A Karhunen Loe’ve like expansion for 1/f processes via wavelets”,	 IEEE Trans. Inform. Theory, Vol. 36, No. 4, pp. 859-861, 1990.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">[22]	P. Abry, D. Veitch, “Wavelet Analysis of Long-Range-Dependent Traffic”, IEEE Transactions on Information Theory, Vol. 44, No.1, pp. 2-15, 1998.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">[23]	H. J. Jeongy, D. McNicklez, K. Pawlikowski, “Fast Self-Similar Teletraffic Generation Based on FGN and Wavelets”, IEEE International Conference on Networks, Brisbane, Australia, 1999, pp. 75-82.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">[24]	R. Bassil, R. Hobeica, W. Itani, C. Ghali, A. Kayssi, and A. Chehab, “Security Analysis and Solution for Thwarting Cache Poisoning Attacks in the Domain Name System”, Proceedings of the 19th IEEE International Conference on Telecommunications (ICT’12), Lebanon, 2012, pp. 1-6.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">[25]	A. Pallavi, P. Hemlata, Network Traffic Analysis Using Packet Sniffer, International Journal of Engineering Research and and Applications, Vol. 2, No. 3, 2012, pp. 854-85</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
