skip to main content
10.1145/2534142.2534146acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaintecConference Proceedingsconference-collections
research-article

Towards classification of DNS erroneous queries

Published:13 November 2013Publication History

ABSTRACT

We analyze domain name system (DNS) errors (i.e., ServFail, Refused and NX Domain errors) in DNS traffic captured at an external connection link of an academic network in Japan and attempt to understand the causes of such errors. Because DNS errors that are responses to erroneous queries have a large impact on DNS traffic, we should reduce as many of them as possible. First, we show that ServFail and Refused errors are generated by queries from a small number of local resolvers and authoritative nameservers that do not relate to ordinary users. Second, we demonstrate that NX Domain errors have several query patterns due to mostly anti-virus/anti-spam systems as well as meaningless queries (i.e., mis-configuration). By analyzing erroneous queries leading to NX Domain errors with the proposed heuristic rules to identify the main causes of such errors, we successfully classify them into nine groups that cover approximately 90% of NX Domain errors with a low false positive rate. Furthermore, we find malicious domain names similar to Japanese SNS sites from the results. We discuss the main causes of these DNS errors and how to reduce them from the results of our analysis.

References

  1. M. Antonakakis, R. Perdisci, W. Lee, N. Vasiloglou II, and D. Dagon. Detecting Malware Domains at the Upper DNS Hierarchy. In USENIX Security Symposium, page 16, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. L. Bilge, E. Kirda, C. Kruegel, and M. Balduzzi. EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis. In NDSS, page 17, 2011.Google ScholarGoogle Scholar
  3. N. Brownlee, K. Claffy, and E. Nemeth. DNS Root/gTLD performance measurements. USENIX LISA, pages 241--256, 2001.Google ScholarGoogle Scholar
  4. S. Castro, D. Wessels, M. Fomenkov, and K. Claffy. A Day at the Root of the Internet. ACM SIGCOMM Computer Communication Review, 38(5):41--46, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. K. Fujiwara, A. Sato, and K. Yoshida. DNS Traffic Analysis: Issues of IPv6 and CDN. In SAINT 2012, pages 129--137, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. H. Gao, V. Yegneswaran, Y. Chen, P. Porras, S. Ghosh, J. Jiang, and H. Duan. An empirical reexamination of global DNS behavior. In SIGCOMM'13, pages 267--278, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S. Hao, N. Feamster, and R. Pandrangi. Monitoring the initial DNS behavior of malicious domains. In IMC'11, pages 269--278, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. K. Ishibashi and K. Sato. Classifying DNS heavy user traffic by using hierarchical aggregate entropy. In WTC 2012, pages 1--6, 2012.Google ScholarGoogle Scholar
  9. N. Jiang, J. Cao, Y. Jin, L. E. Li, and Z.-L. Zhang. Identifying suspicious activities through DNS failure graph analysis. In ICNP 2010, pages 144--153, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Kalafut, M. Gupta, C. Cole, L. Chen, and N. Myers. An empirical study of orphan DNS servers in the internet. In IMC'10, pages 308--314, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. P. Vixie. AS112 project. http://www.as112.net/.Google ScholarGoogle Scholar
  12. V. Pappas, Z. Xu, S. Lu, D. Massey, A. Terzis, and L. Zhang. Impact of configuration errors on DNS robustness. In SIGCOMM'04, pages 319--330, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. D. Plonka and P. Barford. Context-aware clustering of DNS query traffic. In IMC'08, pages 217--230, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. D. Wessels and M. Fomenkov. Wow, that's a lot of packets. In PAM'03, page 9, 2003.Google ScholarGoogle Scholar
  15. S. Yadav, A. Reddy, A. Reddy, and S. Ranjan. Detecting algorithmically generated malicious domain names. In IMC'10, pages 48--61, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. B. Zdrnja, N. Brownlee, and D. Wessels. Passive Monitoring of DNS Anomalies. In DIMVA'07, pages 129--139, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Towards classification of DNS erroneous queries

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        AINTEC '13: Proceedings of the 9th Asian Internet Engineering Conference
        November 2013
        81 pages
        ISBN:9781450324519
        DOI:10.1145/2534142

        Copyright © 2013 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 13 November 2013

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate15of38submissions,39%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader