A Study of DNS Log Analysis for Anomaly Query Detection
碩士 === 大同大學 === 資訊工程學系(所) === 107 === The Domain Name System (DNS) is one of the most important services in the Internet. With the advancement of information technology, the Internet is an indispensable part of our daily life. Any application that uses the Internet, the DNS service is needed. There...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2019
|
Online Access: | http://ndltd.ncl.edu.tw/handle/shhmm2 |
id |
ndltd-TW-107TTU05392009 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-107TTU053920092019-11-05T03:37:54Z http://ndltd.ncl.edu.tw/handle/shhmm2 A Study of DNS Log Analysis for Anomaly Query Detection 域名系統日誌分析以偵測異常查詢之研究 CHUN-HUNG CHOU 周俊宏 碩士 大同大學 資訊工程學系(所) 107 The Domain Name System (DNS) is one of the most important services in the Internet. With the advancement of information technology, the Internet is an indispensable part of our daily life. Any application that uses the Internet, the DNS service is needed. There are a lot of attacks in the Internet, and the DNS has gradually become the target of hacking attacks. Whenever a user enters the website domain name into the address part, the system will query the IP address corresponding to the domain name through DNS. The DNS server will store all the query records and log data to the log file. By integrating the source IP address, domain name and other information for an predefined interval, a dashboard is designed to show possible abnormal query records. The managers can then judge the seriousness and take appropriate countermeasures. Tsang-Long pao 包蒼龍 2019 學位論文 ; thesis 41 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 大同大學 === 資訊工程學系(所) === 107 === The Domain Name System (DNS) is one of the most important services in the Internet. With the advancement of information technology, the Internet is an indispensable part of our daily life. Any application that uses the Internet, the DNS service is needed. There are a lot of attacks in the Internet, and the DNS has gradually become the target of hacking attacks.
Whenever a user enters the website domain name into the address part, the system will query the IP address corresponding to the domain name through DNS. The DNS server will store all the query records and log data to the log file. By integrating the source IP address, domain name and other information for an predefined interval, a dashboard is designed to show possible abnormal query records. The managers can then judge the seriousness and take appropriate countermeasures.
|
author2 |
Tsang-Long pao |
author_facet |
Tsang-Long pao CHUN-HUNG CHOU 周俊宏 |
author |
CHUN-HUNG CHOU 周俊宏 |
spellingShingle |
CHUN-HUNG CHOU 周俊宏 A Study of DNS Log Analysis for Anomaly Query Detection |
author_sort |
CHUN-HUNG CHOU |
title |
A Study of DNS Log Analysis for Anomaly Query Detection |
title_short |
A Study of DNS Log Analysis for Anomaly Query Detection |
title_full |
A Study of DNS Log Analysis for Anomaly Query Detection |
title_fullStr |
A Study of DNS Log Analysis for Anomaly Query Detection |
title_full_unstemmed |
A Study of DNS Log Analysis for Anomaly Query Detection |
title_sort |
study of dns log analysis for anomaly query detection |
publishDate |
2019 |
url |
http://ndltd.ncl.edu.tw/handle/shhmm2 |
work_keys_str_mv |
AT chunhungchou astudyofdnsloganalysisforanomalyquerydetection AT zhōujùnhóng astudyofdnsloganalysisforanomalyquerydetection AT chunhungchou yùmíngxìtǒngrìzhìfēnxīyǐzhēncèyìchángcháxúnzhīyánjiū AT zhōujùnhóng yùmíngxìtǒngrìzhìfēnxīyǐzhēncèyìchángcháxúnzhīyánjiū AT chunhungchou studyofdnsloganalysisforanomalyquerydetection AT zhōujùnhóng studyofdnsloganalysisforanomalyquerydetection |
_version_ |
1719287189819359232 |