Using NetFlow to measure the impact of deploying DNS-based blacklists

Martin Fejrskov Andersen*, Jens Myrup Pedersen, Emmanouil Vasilomanolakis

*Corresponding author for this work

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

2 Citations (Scopus)
80 Downloads (Pure)

Abstract

To prevent user exposure to a wide range of cyber security threats, organizations and companies often resort to deploying blacklists in DNS resolvers or DNS firewalls. The impact of such a deployment is often measured by comparing the coverage of individual blacklists, by counting the number of blocked DNS requests, or by counting the number of flows redirected to a benign web page that contains a warning to the user. This paper suggests an alternative to this by using NetFlow data to measure the effect of a DNS-based blacklist deployment. Our findings suggest that only 38-40% of blacklisted flows are web traffic. Furthermore, the paper analyzes the flows blacklisted by IP address, and it is shown that the majority of these are potentially benign, such as flows towards a web server hosting both benign and malicious sites. Finally, the flows blacklisted by domain name are categorized as either spam or malware, and it is shown that less than 6% are considered malicious.
Original languageEnglish
Title of host publicationSecurity and Privacy in Communication Networks : 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6–9, 2021, Proceedings, Part I
EditorsJoaquin Garcia-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung
Number of pages21
Volume1
Place of PublicationSpringer, Cham
PublisherSpringer
Publication date3 Nov 2021
Pages476-496
ISBN (Print)978-3-030-90018-2
ISBN (Electronic)978-3-030-90019-9
DOIs
Publication statusPublished - 3 Nov 2021
EventInternational Conference, SecureComm 2021 - Virtual Event
Duration: 6 Sept 20219 Sept 2021
Conference number: 17th

Conference

ConferenceInternational Conference, SecureComm 2021
Number17th
LocationVirtual Event
Period06/09/202109/09/2021
SeriesLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Volume398
ISSN1867-8211

Keywords

  • Blacklist
  • DNS
  • ISP
  • Ipfix
  • Netflow
  • RBL
  • Threat intelligence

Fingerprint

Dive into the research topics of 'Using NetFlow to measure the impact of deploying DNS-based blacklists'. Together they form a unique fingerprint.

Cite this