peeking through the cloud client density estimation via dns cache probing
Download
Skip this Video
Download Presentation
Peeking Through the Cloud: Client Density Estimation via DNS Cache Probing

Loading in 2 Seconds...

play fullscreen
1 / 23

Peeking Through the Cloud: Client Density Estimation via DNS Cache Probing - PowerPoint PPT Presentation


  • 82 Views
  • Uploaded on

Peeking Through the Cloud: Client Density Estimation via DNS Cache Probing. By: MOHEEB ABU RAJAB FABIAN MONROSE NIELS PROVOS Published Date: October 2010. What is DNS ? Why should we use Cloud Computing? What is Cache Probing? What is Botnet?. Introduction.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Peeking Through the Cloud: Client Density Estimation via DNS Cache Probing' - vina


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
peeking through the cloud client density estimation via dns cache probing

Peeking Through the Cloud: Client Density Estimation via DNS Cache Probing

By:

MOHEEB ABU RAJAB

FABIAN MONROSE

NIELS PROVOS

Published Date: October 2010

slide2

What is DNS ?

  • Why should we use Cloud Computing?
  • What is Cache Probing?
  • What is Botnet?
introduction
Introduction
  • DNS caching Probing receive answers from DNS server for third party domains.
  • Cloud Computing - “Computing as a Utility”
  • Issues with cloud computing
  • Botnets -infected-hosts
  • Network Security – Activities design to protect your network
slide4
DNS
  • Domain name space consists tree of domain names.
  • The tree sub – divides into zones at the root zone.
  • The old zone ceases to authorities to the new zone.
cloud computing
Cloud Computing
  • Achieve economics of scale
  • Reduce spending on technology infrastructure
  • Reduce capital costs
  • Improve flexibility
  • Improve accessibility
estimation methodology
Estimation Methodology
  • Growing security and privacy
  • Approach- Network services use DNS name
  • DNS cache probing measure the evolution of name in resolver’s cache
experimental evaluation
Experimental Evaluation
  • Centralized Scheduler for starting Iperf clients

-Predefined serialized schedule file at each VM instance.

-Schedule file contains a time stamp along with the nodes that should communicate for a single reading.

* Iperf - Network testing tool to measure the network  throughput between end hosts.

slide12

Relative estimation error of the number of hosts n with DNS queries per TTL

web metering
Web Metering
  • Website Metering - fastest and easiest way to see website ranks
  • No manual digging and guessing
  • Website Popularity is fully automated and runs right from your desktop
  • The strong correlation between website popularity, benefits and techniques for rank inflation
slide16

Alexa provides information - websites including Top sites, Internet Traffic stats and Metrics, Online reviews contact information and Related links and search

  • Alexa Also found some Fraudulent Inflation by

- Click fraud

- Direct manipulation attacks

  • The resolver list is sanitized to extract the “cooperative resolvers”
botnet
Botnet
  • Botnet is used to defined the user network by Bot master
  • Develop a scalable and robust infrastructure to capture & concurrently track multiple Botnets
  • IRC tracking, DNS Cache probing (minimal)
  • Must be benign – not used to infect others outside the testing environment
  • Analysis of measurements, structural and behavioral aspect of Botnets
birth of botnet
Birth of Botnet
  • Bots are born from

program binaries

that infect your PC

  • Self-replicating worms
  • E-mail viruses
  • Shell code (scripts)
slide19

The IRC tracker (also called a drone) filters traffic and acts as a Bot to trick the IRC room to iteratively probe to find the footprint of particular Botnets

    • Uses DNS Probing
    • Acts as a spy
conclusion
Conclusion
  • In this paper, we provide a ne technique for Internet demographics, the client population density of service. Also verifying the popularity rank of a website and estimating of botnet infection. A refined techniques for estimating botnet size with improving their benefits.
ad