DNS ANY Request Cannon in Total Inbound ANY Resource Record DNS Query Request Packet Traffic (技術と社会・倫理) DNS ANY Request Cannon in Total Inbound ANY Resource Record DNS Query Request Packet Traffic

Search this Article

Author(s)

Abstract

We statistically investigated the total ANY resource record (RR) based DNS query request packet traffic from the Internet to the top domain DNS server in a university campus network through January 1st, 2011 to December 31st, 2012. The obtained results are: (1) We found a significant increase in the inbound ANY RR based DNS query request traffic at November 28th, 2011. (2) In the DNS query request packet traffic, we observed only a query keyword of the campus domain name. (3) We found a correlation between the total inbound DNS query request packet traffic and the DNS query request packet traffic including the query keyword. (4) Also, we found that the source IP addresses were distributed in the ANY RR based DNS query request packet traffic. These results indicate that the ANY RR based DNS request packet traffic is strange. Therefore, we should pay much attention to the ANY RR based DNS query request traffic including the single domain name.

Journal

  • IEICE technical report. Social Implications of Technology and Information Ethics

    IEICE technical report. Social Implications of Technology and Information Ethics 112(488), 67-70, 2013-03-14

    The Institute of Electronics, Information and Communication Engineers

Codes

  • NII Article ID (NAID)
    110009712557
  • NII NACSIS-CAT ID (NCID)
    AA11651731
  • Text Lang
    ENG
  • ISSN
    0913-5685
  • NDL Article ID
    024419586
  • NDL Call No.
    Z16-940
  • Data Source
    NDL  NII-ELS 
Page Top