Analyzing DNS requests for anomaly detection
First Claim
1. A computer-implemented method for detecting anomalies in Domain Name System (DNS) requests, the method comprising:
- receiving DNS data, the DNS data including a plurality of DNS requests generated within a time period, wherein the DNS data includes a plurality of DNS data fragments received during the time period;
the plurality of DNS requests including a first DNS request (Qi), wherein the first DNS request is associated with a domain name;
detecting a family of domain names associated with the domain name, said detecting comprising calculating a semantic similarity between strings of domain names;
selecting a plurality of second DNS requests (Qj) from the plurality of DNS requests, wherein each of the second DNS requests is member of the family of domain names;
calculating a count value for each of the DNS data fragments, wherein each of the count values represents a number of instances or frequency the second DNS requests appear within one of the DNS data fragments; and
determining an anomaly trend based on the count values of the plurality of second DNS requests associated with the plurality of the DNS data fragments.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for detecting anomalies in DNS requests comprises receiving a plurality of DNS requests generated within a predetermined period. The predetermined period includes a plurality of DNS data fragments. The method further includes receiving a first DNS request and selecting a plurality of second DNS requests from the plurality of DNS requests such that each of the second DNS requests is a subset of the first DNS request. The method also includes calculating a count value for each of the DNS data fragments, where each of the count values represents a number of instances the second DNS requests appear within one of the DNS data fragments. In some embodiments, the count values for each of the DNS data fragments can be normalized. The method further includes determining an anomaly trend, for example, based on determining that at least one of the count values exceeds a predetermined threshold value.
-
Citations
16 Claims
-
1. A computer-implemented method for detecting anomalies in Domain Name System (DNS) requests, the method comprising:
-
receiving DNS data, the DNS data including a plurality of DNS requests generated within a time period, wherein the DNS data includes a plurality of DNS data fragments received during the time period; the plurality of DNS requests including a first DNS request (Qi), wherein the first DNS request is associated with a domain name; detecting a family of domain names associated with the domain name, said detecting comprising calculating a semantic similarity between strings of domain names; selecting a plurality of second DNS requests (Qj) from the plurality of DNS requests, wherein each of the second DNS requests is member of the family of domain names; calculating a count value for each of the DNS data fragments, wherein each of the count values represents a number of instances or frequency the second DNS requests appear within one of the DNS data fragments; and determining an anomaly trend based on the count values of the plurality of second DNS requests associated with the plurality of the DNS data fragments. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented system for detecting anomalies in Domain Name System (DNS) requests, the system comprising at least one processor and at least one memory storing processor-executable codes, wherein the at least one processor is configured to:
-
receive DNS data, the DNS data including a plurality of DNS requests generated within a time period, wherein the DNS data includes a plurality of DNS data fragments received during the time period; the plurality of DNS requests including a first DNS request (Qi), wherein the first DNS request is associated with a domain name; detect a family of domain names associated with the domain name, said detecting comprising calculating a semantic similarity between strings of domain names; select a plurality of second DNS requests (Qj) from the plurality of DNS requests, wherein each of the second DNS requests is member of the family of domain names; calculate a count value for each of the DNS data fragments, wherein each of the count values represents a number of instances or frequency the second DNS requests appear within one of the DNS data fragments; and determine an anomaly trend based on the count values of the plurality of second DNS requests associated with the plurality of the DNS data fragments. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory processor-readable medium having instructions stored thereon, which when executed by one or more processors, cause the one or more processors to implement a method for detecting anomalies in Domain Name System (DNS) requests, the method comprising:
-
receiving DNS data, the DNS data including a plurality of DNS requests generated within a time period, wherein the DNS data includes a plurality of DNS data fragments received during the time period; the plurality of DNS requests including a first DNS request (Qi), wherein the first DNS request is associated with a domain name; detecting a family of domain names associated with the domain name, said detecting comprising calculating a semantic similarity between strings of domain names; selecting a plurality of second DNS requests (Qj) from the plurality of DNS requests, wherein each of the second DNS requests is member of the family of domain names; calculating a count value for each of the DNS data fragments, wherein each of the count values represents a number of instances or frequency the second DNS requests appear within one of the DNS data fragments; and determining an anomaly trend based on the count values of the plurality of second DNS requests associated with the plurality of the DNS data fragments.
-
Specification