A Study of DNS Log Analysis for Anomaly Query Detection

碩士 === 大同大學 === 資訊工程學系(所) === 107 === The Domain Name System (DNS) is one of the most important services in the Internet. With the advancement of information technology, the Internet is an indispensable part of our daily life. Any application that uses the Internet, the DNS service is needed. There...

Full description

Bibliographic Details
Main Authors: CHUN-HUNG CHOU, 周俊宏
Other Authors: Tsang-Long pao
Format: Others
Language:zh-TW
Published: 2019
Online Access:http://ndltd.ncl.edu.tw/handle/shhmm2
id ndltd-TW-107TTU05392009
record_format oai_dc
spelling ndltd-TW-107TTU053920092019-11-05T03:37:54Z http://ndltd.ncl.edu.tw/handle/shhmm2 A Study of DNS Log Analysis for Anomaly Query Detection 域名系統日誌分析以偵測異常查詢之研究 CHUN-HUNG CHOU 周俊宏 碩士 大同大學 資訊工程學系(所) 107 The Domain Name System (DNS) is one of the most important services in the Internet. With the advancement of information technology, the Internet is an indispensable part of our daily life. Any application that uses the Internet, the DNS service is needed. There are a lot of attacks in the Internet, and the DNS has gradually become the target of hacking attacks. Whenever a user enters the website domain name into the address part, the system will query the IP address corresponding to the domain name through DNS. The DNS server will store all the query records and log data to the log file. By integrating the source IP address, domain name and other information for an predefined interval, a dashboard is designed to show possible abnormal query records. The managers can then judge the seriousness and take appropriate countermeasures. Tsang-Long pao 包蒼龍 2019 學位論文 ; thesis 41 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 大同大學 === 資訊工程學系(所) === 107 === The Domain Name System (DNS) is one of the most important services in the Internet. With the advancement of information technology, the Internet is an indispensable part of our daily life. Any application that uses the Internet, the DNS service is needed. There are a lot of attacks in the Internet, and the DNS has gradually become the target of hacking attacks. Whenever a user enters the website domain name into the address part, the system will query the IP address corresponding to the domain name through DNS. The DNS server will store all the query records and log data to the log file. By integrating the source IP address, domain name and other information for an predefined interval, a dashboard is designed to show possible abnormal query records. The managers can then judge the seriousness and take appropriate countermeasures.
author2 Tsang-Long pao
author_facet Tsang-Long pao
CHUN-HUNG CHOU
周俊宏
author CHUN-HUNG CHOU
周俊宏
spellingShingle CHUN-HUNG CHOU
周俊宏
A Study of DNS Log Analysis for Anomaly Query Detection
author_sort CHUN-HUNG CHOU
title A Study of DNS Log Analysis for Anomaly Query Detection
title_short A Study of DNS Log Analysis for Anomaly Query Detection
title_full A Study of DNS Log Analysis for Anomaly Query Detection
title_fullStr A Study of DNS Log Analysis for Anomaly Query Detection
title_full_unstemmed A Study of DNS Log Analysis for Anomaly Query Detection
title_sort study of dns log analysis for anomaly query detection
publishDate 2019
url http://ndltd.ncl.edu.tw/handle/shhmm2
work_keys_str_mv AT chunhungchou astudyofdnsloganalysisforanomalyquerydetection
AT zhōujùnhóng astudyofdnsloganalysisforanomalyquerydetection
AT chunhungchou yùmíngxìtǒngrìzhìfēnxīyǐzhēncèyìchángcháxúnzhīyánjiū
AT zhōujùnhóng yùmíngxìtǒngrìzhìfēnxīyǐzhēncèyìchángcháxúnzhīyánjiū
AT chunhungchou studyofdnsloganalysisforanomalyquerydetection
AT zhōujùnhóng studyofdnsloganalysisforanomalyquerydetection
_version_ 1719287189819359232