学術情報処理研究
Online ISSN : 2433-7595
Print ISSN : 1343-2915
原著論文
A DNS-based Countermeasure Technology for Bot Worm-infected PC terminals in the Campus Network
Dennis A. Ludeña RomañaHirofumi NagatomiYasuo MusashiRyuichi MatsubaKenichi Sugitani
著者情報
ジャーナル フリー

2006 年 10 巻 1 号 p. 39-46

詳細
抄録

The DNS query traffic in a campus top domain DNS server were statistically investigated in order to find out the security incidents, especially bot worm (BW)-infected PCs on the campus network. The interesting results are obtained: (1) The total traffic of the DNS query access from the outside of the campus network frequently correlates with that of the number of their unique source IP addresses. (2) The unique source IP address-based entropy (randomness) also frequently correlates well with the query contents-based one. Therefore, these results indicate that we can detect suspicious IP hosts, especially, spam bots in the campus network by only watching DNS query traffic from the outside of the university.

著者関連情報
© 2006 Journal for Academic Computing and Networking Editorial Board
前の記事 次の記事
feedback
Top