Affinito, Antonia (2023) Malicious and Large-Scale Phenomena over the Internet: An Analysis based on DNS. [Tesi di dottorato]

[thumbnail of affinito_antonia_35.pdf]
Preview
Text
affinito_antonia_35.pdf

Download (14MB) | Preview
Item Type: Tesi di dottorato
Resource language: English
Title: Malicious and Large-Scale Phenomena over the Internet: An Analysis based on DNS
Creators:
Creators
Email
Affinito, Antonia
antonia.affiinito@unina.it
Date: 9 March 2023
Number of Pages: 184
Institution: Università degli Studi di Napoli Federico II
Department: Ingegneria Elettrica e delle Tecnologie dell'Informazione
Dottorato: Information technology and electrical engineering
Ciclo di dottorato: 35
Coordinatore del Corso di dottorato:
nome
email
Russo, Stefano
stefano.russo@unina.it
Tutor:
nome
email
Botta, Alessio
UNSPECIFIED
Date: 9 March 2023
Number of Pages: 184
Keywords: Botnet, Cyber Threats, Domain Names, DNS, COVID-19 Pandemic, Russia-Ukraine Conflict
Settori scientifico-disciplinari del MIUR: Area 09 - Ingegneria industriale e dell'informazione > ING-INF/05 - Sistemi di elaborazione delle informazioni
Date Deposited: 14 Mar 2023 19:36
Last Modified: 10 Apr 2025 13:00
URI: http://www.fedoa.unina.it/id/eprint/15115

Collection description

Cyber security threats and real-life phenomena (e.g., COVID-19 pandemic) are increasingly reflected over the Internet. Hackers usually scan a network to discover active and vulnerable network devices prior to initiating a malicious activity. This is also the approach adopted by botnets, one of the most important, current cyber security threats. These malicious networks of bots more and more use the Domain Name System (DNS) as a tool for their operations. This thesis provides twofold contributions. The first one addresses the problem of detecting port and net scans in high-speed networks. Big Data analysis techniques are applied to cope with the large volume of data to be processed. Mirai botnet scan is also investigated. Scrutinizing its signature over a six-year period from real Internet traffic reveals the evolution of such botnet and its variants. The second contribution focuses on DNS as a good observation lens for monitoring the proper operation of the Internet. It focuses on how Internet Service Providers and public DNS resolvers protect users accessing domains associated with such activities. It also shows how the lifetime of malicious domain names may be shorter than the one of benign domains due to take-down efforts of registries. Finally, two case studies on how DNS data can be used to analyze prominent and global real-life events are reported. First, the effect of the COVID-19 pandemic restrictions on network utilization is explored, providing insights into the usage of Internet applications during this period. Second, the impact of the Ukraine conflict on Russian domain infrastructure is presented, investigating its changes before and after the start of this event.

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item