SlideShare a Scribd company logo
1 of 8
DNS, the Domain Name System, is the Internet’s distributed
database which maps the names used by users of the web -
www.yahoo.com- to the corresponding IP address.
1
2
3
4
5
6
7
Local DNS Cache
ISP Recursive DNS
Server
Root Nameservers
TLD Nameservers
Authoritative DNS
servers
Retrieve the record
Receive the
answer
DNS port is 53.
Any DNS message should have the number 53 as
the port number as either Source or Destination.
Fist message sent in any DNS exchange should
be query. And it should be sent to server.
The header size is 12 bytes.
It receives UDP packets with port 53 as Destination portInternal DNS
• If UDP source port 53 replies are seen coming form the same node back to the IP address which
sent the query, then it’s almost certain that the node is Server.
The traffic exchange should be balanced.Traffic Exchange
• It’s an important characteristic of DNS traffic that if message exchange occur between two IP
address, then it should balanced,( Query should occur before the Response.
packet size must be larger than 40 bytes if DNS Q/R included.Packet size
• TCP requires minimum 20 bytes for header info.
UDP header 8 bytes.
DNS header 12 bytes.
Response are not expected to be bigger than the query.Response Size
• Response size is not that big because it’s only send the IP address.
It include the same domain name along with the corresponding IP address, which is 4 bytes long
Details
Methodology
Capturing • Capture all data on UDP Port 53.
Matching
• Match flow to create a conversation
Conversation
Type
• Determine that the conversation Is normal or
imbalanced
Identification
Apply to rules to Identify DNS Server.
Thanks

More Related Content

What's hot (20)

Domain Name System ppt
Domain Name System pptDomain Name System ppt
Domain Name System ppt
 
DNS : The internet’s directory service
DNS : The internet’s directory serviceDNS : The internet’s directory service
DNS : The internet’s directory service
 
Chapter 29 Domain Name System.ppt
Chapter 29 Domain Name System.pptChapter 29 Domain Name System.ppt
Chapter 29 Domain Name System.ppt
 
Dns detail understanding
Dns detail understandingDns detail understanding
Dns detail understanding
 
domain network services (dns)
 domain network services (dns) domain network services (dns)
domain network services (dns)
 
Dns protocol design attacks and security
Dns protocol design attacks and securityDns protocol design attacks and security
Dns protocol design attacks and security
 
Introduction to DNS
Introduction to DNSIntroduction to DNS
Introduction to DNS
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Domain Name System DNS
Domain Name System DNSDomain Name System DNS
Domain Name System DNS
 
Chapter 4 configuring and managing the dns server role
Chapter 4   configuring and managing the dns server roleChapter 4   configuring and managing the dns server role
Chapter 4 configuring and managing the dns server role
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name System
 
Dns 2
Dns 2Dns 2
Dns 2
 
Domain Name System Explained
Domain Name System Explained Domain Name System Explained
Domain Name System Explained
 
How to configure dns server(2)
How to configure dns server(2)How to configure dns server(2)
How to configure dns server(2)
 
DNS
DNSDNS
DNS
 
main
mainmain
main
 
Dns
DnsDns
Dns
 
Domain name system
Domain name systemDomain name system
Domain name system
 
DNS (Domain Name System)
DNS (Domain Name System)DNS (Domain Name System)
DNS (Domain Name System)
 
Domainnamesystem
DomainnamesystemDomainnamesystem
Domainnamesystem
 

Viewers also liked

Domain Name System
Domain Name SystemDomain Name System
Domain Name SystemVinay Kumar
 
Toolbar, statusbar, coolbar in vb
Toolbar, statusbar, coolbar in vbToolbar, statusbar, coolbar in vb
Toolbar, statusbar, coolbar in vbAmandeep Kaur
 
Studying the Advantages of Music in English in the Process of English Learnin...
Studying the Advantages of Music in English in the Process of English Learnin...Studying the Advantages of Music in English in the Process of English Learnin...
Studying the Advantages of Music in English in the Process of English Learnin...UNIVERSIDAD MAGISTER (Sitio Oficial)
 
Modelos de prueba unidad i
Modelos de prueba unidad iModelos de prueba unidad i
Modelos de prueba unidad iflor2510
 
разработка агрегированного индекса финансовой стабильности
разработка агрегированного индекса финансовой стабильностиразработка агрегированного индекса финансовой стабильности
разработка агрегированного индекса финансовой стабильностиИнфобанк бай
 
Guanyadors Premi Sambori Vall Albaida 2016
Guanyadors Premi Sambori Vall Albaida 2016Guanyadors Premi Sambori Vall Albaida 2016
Guanyadors Premi Sambori Vall Albaida 2016DianiaTV
 
CV_Frances Spencer_Jan 2017
CV_Frances Spencer_Jan 2017CV_Frances Spencer_Jan 2017
CV_Frances Spencer_Jan 2017Frances Spencer
 
THE NATIONAL PLAN OF ENGLISH AS A FOREING LANGUAGE IN PRIMARY SCHOOLS AND ITS...
THE NATIONAL PLAN OF ENGLISH AS A FOREING LANGUAGE IN PRIMARY SCHOOLS AND ITS...THE NATIONAL PLAN OF ENGLISH AS A FOREING LANGUAGE IN PRIMARY SCHOOLS AND ITS...
THE NATIONAL PLAN OF ENGLISH AS A FOREING LANGUAGE IN PRIMARY SCHOOLS AND ITS...UNIVERSIDAD MAGISTER (Sitio Oficial)
 
selfid easdfafasdasgfaisdnasd
selfid easdfafasdasgfaisdnasdselfid easdfafasdasgfaisdnasd
selfid easdfafasdasgfaisdnasdLuis Mosnx
 
Follow up email presentation | Get a job interview
Follow up email presentation | Get a job interviewFollow up email presentation | Get a job interview
Follow up email presentation | Get a job interviewPierre Faure
 
Determinación del Nivel de Cumplimiento de la Ley 7935 "Ley Integral para la ...
Determinación del Nivel de Cumplimiento de la Ley 7935 "Ley Integral para la ...Determinación del Nivel de Cumplimiento de la Ley 7935 "Ley Integral para la ...
Determinación del Nivel de Cumplimiento de la Ley 7935 "Ley Integral para la ...UNIVERSIDAD MAGISTER (Sitio Oficial)
 
Les memoires
Les memoiresLes memoires
Les memoiresdigidid
 
Teoria del modelado de objetos otros diagramas actividad despliegue
Teoria del modelado de objetos otros diagramas actividad despliegueTeoria del modelado de objetos otros diagramas actividad despliegue
Teoria del modelado de objetos otros diagramas actividad despliegueRobert Rodriguez
 
University of Utah Health Exceptional Value Annual Report 2014
University of Utah Health Exceptional Value Annual Report 2014University of Utah Health Exceptional Value Annual Report 2014
University of Utah Health Exceptional Value Annual Report 2014University of Utah
 
Manual de la Vivienda - Covintec Chile
Manual de la Vivienda - Covintec ChileManual de la Vivienda - Covintec Chile
Manual de la Vivienda - Covintec ChileCovintec Chile
 

Viewers also liked (19)

Domain Name System
Domain Name SystemDomain Name System
Domain Name System
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name System
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Toolbar, statusbar, coolbar in vb
Toolbar, statusbar, coolbar in vbToolbar, statusbar, coolbar in vb
Toolbar, statusbar, coolbar in vb
 
Studying the Advantages of Music in English in the Process of English Learnin...
Studying the Advantages of Music in English in the Process of English Learnin...Studying the Advantages of Music in English in the Process of English Learnin...
Studying the Advantages of Music in English in the Process of English Learnin...
 
Modelos de prueba unidad i
Modelos de prueba unidad iModelos de prueba unidad i
Modelos de prueba unidad i
 
разработка агрегированного индекса финансовой стабильности
разработка агрегированного индекса финансовой стабильностиразработка агрегированного индекса финансовой стабильности
разработка агрегированного индекса финансовой стабильности
 
Guanyadors Premi Sambori Vall Albaida 2016
Guanyadors Premi Sambori Vall Albaida 2016Guanyadors Premi Sambori Vall Albaida 2016
Guanyadors Premi Sambori Vall Albaida 2016
 
CV_Frances Spencer_Jan 2017
CV_Frances Spencer_Jan 2017CV_Frances Spencer_Jan 2017
CV_Frances Spencer_Jan 2017
 
Types de données MySQL
Types de données MySQLTypes de données MySQL
Types de données MySQL
 
THE NATIONAL PLAN OF ENGLISH AS A FOREING LANGUAGE IN PRIMARY SCHOOLS AND ITS...
THE NATIONAL PLAN OF ENGLISH AS A FOREING LANGUAGE IN PRIMARY SCHOOLS AND ITS...THE NATIONAL PLAN OF ENGLISH AS A FOREING LANGUAGE IN PRIMARY SCHOOLS AND ITS...
THE NATIONAL PLAN OF ENGLISH AS A FOREING LANGUAGE IN PRIMARY SCHOOLS AND ITS...
 
selfid easdfafasdasgfaisdnasd
selfid easdfafasdasgfaisdnasdselfid easdfafasdasgfaisdnasd
selfid easdfafasdasgfaisdnasd
 
Follow up email presentation | Get a job interview
Follow up email presentation | Get a job interviewFollow up email presentation | Get a job interview
Follow up email presentation | Get a job interview
 
Determinación del Nivel de Cumplimiento de la Ley 7935 "Ley Integral para la ...
Determinación del Nivel de Cumplimiento de la Ley 7935 "Ley Integral para la ...Determinación del Nivel de Cumplimiento de la Ley 7935 "Ley Integral para la ...
Determinación del Nivel de Cumplimiento de la Ley 7935 "Ley Integral para la ...
 
Les memoires
Les memoiresLes memoires
Les memoires
 
Teoria del modelado de objetos otros diagramas actividad despliegue
Teoria del modelado de objetos otros diagramas actividad despliegueTeoria del modelado de objetos otros diagramas actividad despliegue
Teoria del modelado de objetos otros diagramas actividad despliegue
 
Pfe final lundi matin
Pfe final lundi matinPfe final lundi matin
Pfe final lundi matin
 
University of Utah Health Exceptional Value Annual Report 2014
University of Utah Health Exceptional Value Annual Report 2014University of Utah Health Exceptional Value Annual Report 2014
University of Utah Health Exceptional Value Annual Report 2014
 
Manual de la Vivienda - Covintec Chile
Manual de la Vivienda - Covintec ChileManual de la Vivienda - Covintec Chile
Manual de la Vivienda - Covintec Chile
 

Similar to Understanding DNS Traffic Pattern

06 coms 525 tcpip - dhcp and dns
06   coms 525 tcpip - dhcp and dns06   coms 525 tcpip - dhcp and dns
06 coms 525 tcpip - dhcp and dnsPalanivel Kuppusamy
 
c5c1db8d-8375-4f17-bf6a-56ea5342e58d.pptx
c5c1db8d-8375-4f17-bf6a-56ea5342e58d.pptxc5c1db8d-8375-4f17-bf6a-56ea5342e58d.pptx
c5c1db8d-8375-4f17-bf6a-56ea5342e58d.pptxchakravardhannani123
 
Dns name resolution process
Dns name resolution processDns name resolution process
Dns name resolution processkannanragothaman
 
How DNS works and How to secure it: An Introduction
How DNS works and How to secure it: An IntroductionHow DNS works and How to secure it: An Introduction
How DNS works and How to secure it: An Introductionyasithbagya1
 
Computer Networks Module 1 - part 2.pdf
Computer Networks Module 1 - part 2.pdfComputer Networks Module 1 - part 2.pdf
Computer Networks Module 1 - part 2.pdfShanthalaKV
 
Domain Name System and Dynamic Host Configuration Protocol.pptx
Domain Name System and Dynamic Host Configuration Protocol.pptxDomain Name System and Dynamic Host Configuration Protocol.pptx
Domain Name System and Dynamic Host Configuration Protocol.pptxUsmanAhmed269749
 
Presentation on Domain Name System
Presentation on Domain Name SystemPresentation on Domain Name System
Presentation on Domain Name SystemChinmay Joshi
 
Deploying and configuring dns service
Deploying and configuring dns serviceDeploying and configuring dns service
Deploying and configuring dns servicelatoniasmith
 
DNS - Domain Name System
DNS - Domain Name SystemDNS - Domain Name System
DNS - Domain Name SystemPeter R. Egli
 
Computer Networks - DNS
Computer Networks - DNSComputer Networks - DNS
Computer Networks - DNSDHIVYADEVAKI
 
Local DNS with pfSense 2.4 - pfSense Hangout April 2018
Local DNS with pfSense 2.4 - pfSense Hangout April 2018Local DNS with pfSense 2.4 - pfSense Hangout April 2018
Local DNS with pfSense 2.4 - pfSense Hangout April 2018Netgate
 

Similar to Understanding DNS Traffic Pattern (20)

06 coms 525 tcpip - dhcp and dns
06   coms 525 tcpip - dhcp and dns06   coms 525 tcpip - dhcp and dns
06 coms 525 tcpip - dhcp and dns
 
Dn sonly
Dn sonlyDn sonly
Dn sonly
 
c5c1db8d-8375-4f17-bf6a-56ea5342e58d.pptx
c5c1db8d-8375-4f17-bf6a-56ea5342e58d.pptxc5c1db8d-8375-4f17-bf6a-56ea5342e58d.pptx
c5c1db8d-8375-4f17-bf6a-56ea5342e58d.pptx
 
Dns name resolution process
Dns name resolution processDns name resolution process
Dns name resolution process
 
How DNS works and How to secure it: An Introduction
How DNS works and How to secure it: An IntroductionHow DNS works and How to secure it: An Introduction
How DNS works and How to secure it: An Introduction
 
DNS.pptx
DNS.pptxDNS.pptx
DNS.pptx
 
Lecture 5- url-dns
Lecture  5- url-dnsLecture  5- url-dns
Lecture 5- url-dns
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Domain name system
Domain name systemDomain name system
Domain name system
 
Computer Networks Module 1 - part 2.pdf
Computer Networks Module 1 - part 2.pdfComputer Networks Module 1 - part 2.pdf
Computer Networks Module 1 - part 2.pdf
 
Domain Name System and Dynamic Host Configuration Protocol.pptx
Domain Name System and Dynamic Host Configuration Protocol.pptxDomain Name System and Dynamic Host Configuration Protocol.pptx
Domain Name System and Dynamic Host Configuration Protocol.pptx
 
08Mapping.ppt
08Mapping.ppt08Mapping.ppt
08Mapping.ppt
 
Presentation on Domain Name System
Presentation on Domain Name SystemPresentation on Domain Name System
Presentation on Domain Name System
 
Common Network Services
Common Network ServicesCommon Network Services
Common Network Services
 
Deploying and configuring dns service
Deploying and configuring dns serviceDeploying and configuring dns service
Deploying and configuring dns service
 
Dns1111111111
Dns1111111111Dns1111111111
Dns1111111111
 
DNS - Domain Name System
DNS - Domain Name SystemDNS - Domain Name System
DNS - Domain Name System
 
Dns
DnsDns
Dns
 
Computer Networks - DNS
Computer Networks - DNSComputer Networks - DNS
Computer Networks - DNS
 
Local DNS with pfSense 2.4 - pfSense Hangout April 2018
Local DNS with pfSense 2.4 - pfSense Hangout April 2018Local DNS with pfSense 2.4 - pfSense Hangout April 2018
Local DNS with pfSense 2.4 - pfSense Hangout April 2018
 

More from Mr Cracker

Denial Of Service
Denial Of ServiceDenial Of Service
Denial Of ServiceMr Cracker
 
How to setup mercury wifi router
How to setup mercury wifi routerHow to setup mercury wifi router
How to setup mercury wifi routerMr Cracker
 
Hacking Citrix Cloud Server
Hacking Citrix Cloud ServerHacking Citrix Cloud Server
Hacking Citrix Cloud ServerMr Cracker
 
Unblock all the Blocked sites in China
Unblock all the Blocked sites in ChinaUnblock all the Blocked sites in China
Unblock all the Blocked sites in ChinaMr Cracker
 
6 Blessed Sayings of Holy Prophet Muhammad
6 Blessed Sayings of Holy Prophet Muhammad6 Blessed Sayings of Holy Prophet Muhammad
6 Blessed Sayings of Holy Prophet MuhammadMr Cracker
 
Xen and Art of Virtualization (Xen Architecture)
Xen and Art of Virtualization (Xen Architecture)Xen and Art of Virtualization (Xen Architecture)
Xen and Art of Virtualization (Xen Architecture)Mr Cracker
 
China Vs World
China Vs WorldChina Vs World
China Vs WorldMr Cracker
 
Virtualization, Cloud computing and OS Fingerprinting
Virtualization, Cloud computing and OS FingerprintingVirtualization, Cloud computing and OS Fingerprinting
Virtualization, Cloud computing and OS FingerprintingMr Cracker
 
Interesting Email Services (Email Hacks)
Interesting Email Services  (Email Hacks)Interesting Email Services  (Email Hacks)
Interesting Email Services (Email Hacks)Mr Cracker
 
The Mythical Man Month
The Mythical Man MonthThe Mythical Man Month
The Mythical Man MonthMr Cracker
 
Google Hacking and Power Search Techniques
Google Hacking and Power Search TechniquesGoogle Hacking and Power Search Techniques
Google Hacking and Power Search TechniquesMr Cracker
 
Facts you don’t know about pakistan
Facts you don’t know about pakistanFacts you don’t know about pakistan
Facts you don’t know about pakistanMr Cracker
 
Interesting email service’s
Interesting email service’sInteresting email service’s
Interesting email service’sMr Cracker
 

More from Mr Cracker (14)

Denial Of Service
Denial Of ServiceDenial Of Service
Denial Of Service
 
How to setup mercury wifi router
How to setup mercury wifi routerHow to setup mercury wifi router
How to setup mercury wifi router
 
Hacking Citrix Cloud Server
Hacking Citrix Cloud ServerHacking Citrix Cloud Server
Hacking Citrix Cloud Server
 
Unblock all the Blocked sites in China
Unblock all the Blocked sites in ChinaUnblock all the Blocked sites in China
Unblock all the Blocked sites in China
 
6 Blessed Sayings of Holy Prophet Muhammad
6 Blessed Sayings of Holy Prophet Muhammad6 Blessed Sayings of Holy Prophet Muhammad
6 Blessed Sayings of Holy Prophet Muhammad
 
Xen and Art of Virtualization (Xen Architecture)
Xen and Art of Virtualization (Xen Architecture)Xen and Art of Virtualization (Xen Architecture)
Xen and Art of Virtualization (Xen Architecture)
 
China Vs World
China Vs WorldChina Vs World
China Vs World
 
Virtualization, Cloud computing and OS Fingerprinting
Virtualization, Cloud computing and OS FingerprintingVirtualization, Cloud computing and OS Fingerprinting
Virtualization, Cloud computing and OS Fingerprinting
 
Interesting Email Services (Email Hacks)
Interesting Email Services  (Email Hacks)Interesting Email Services  (Email Hacks)
Interesting Email Services (Email Hacks)
 
The Mythical Man Month
The Mythical Man MonthThe Mythical Man Month
The Mythical Man Month
 
Google Hacking and Power Search Techniques
Google Hacking and Power Search TechniquesGoogle Hacking and Power Search Techniques
Google Hacking and Power Search Techniques
 
Facts you don’t know about pakistan
Facts you don’t know about pakistanFacts you don’t know about pakistan
Facts you don’t know about pakistan
 
Wiretapping
WiretappingWiretapping
Wiretapping
 
Interesting email service’s
Interesting email service’sInteresting email service’s
Interesting email service’s
 

Recently uploaded

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Understanding DNS Traffic Pattern

  • 1.
  • 2. DNS, the Domain Name System, is the Internet’s distributed database which maps the names used by users of the web - www.yahoo.com- to the corresponding IP address.
  • 3. 1 2 3 4 5 6 7 Local DNS Cache ISP Recursive DNS Server Root Nameservers TLD Nameservers Authoritative DNS servers Retrieve the record Receive the answer
  • 4. DNS port is 53. Any DNS message should have the number 53 as the port number as either Source or Destination. Fist message sent in any DNS exchange should be query. And it should be sent to server. The header size is 12 bytes.
  • 5. It receives UDP packets with port 53 as Destination portInternal DNS • If UDP source port 53 replies are seen coming form the same node back to the IP address which sent the query, then it’s almost certain that the node is Server. The traffic exchange should be balanced.Traffic Exchange • It’s an important characteristic of DNS traffic that if message exchange occur between two IP address, then it should balanced,( Query should occur before the Response.
  • 6. packet size must be larger than 40 bytes if DNS Q/R included.Packet size • TCP requires minimum 20 bytes for header info. UDP header 8 bytes. DNS header 12 bytes. Response are not expected to be bigger than the query.Response Size • Response size is not that big because it’s only send the IP address. It include the same domain name along with the corresponding IP address, which is 4 bytes long Details
  • 7. Methodology Capturing • Capture all data on UDP Port 53. Matching • Match flow to create a conversation Conversation Type • Determine that the conversation Is normal or imbalanced Identification Apply to rules to Identify DNS Server.