search menu icon-carat-right cmu-wordmark

Passive Detection of Misbehaving Name Servers

October 2013 Technical Report
Leigh B. Metcalf, Jonathan Spring

In this report, the authors explore name-server flux and two types of data that can reveal it.

Publisher:

Software Engineering Institute

CMU/SEI Report Number

CMU/SEI-2013-TR-010

DOI (Digital Object Identifier):
10.1184/R1/6576071.v1

Abstract

In the process of categorizing malicious domains, distinguishing between suspicious and benign name servers can allow the name servers themselves to be acted against. Name servers do not normally change internet protocol (IP) addresses frequently. Domains that do change IP addresses quickly or often are said to exhibit IP flux, which can allow services, such as web pages that deliver malicious content, to circumvent defenders' attempts to block their IP addresses. IP flux in a name server's domain may be a sign that the name server is suspicious. This report demonstrates that name-server flux exists and is ongoing. Furthermore, there are two types of data that can reveal IP flux in domain name system (DNS) servers: passively collected DNS messages and the contents of several large, top-level domains' official zone files.