Information Security 11 min read

Unlocking DNS: Measuring Networks and Detecting Threats with Data

This article explains how DNS data can be leveraged for both network measurement—such as quantifying global DNS hijacking and analyzing NTP pool servers—and security analysis, including threat detection with systems like DNSMon, highlighting the protocol’s growing importance for privacy, performance, and threat intelligence.

360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Unlocking DNS: Measuring Networks and Detecting Threats with Data

1 DNS Overview

DNS is one of the oldest and most fundamental Internet protocols, mapping domain names to IP addresses. Beyond simple mapping, many modern services rely on DNS, making it a complex protocol with thousands of RFC pages.

DNS RFC growth chart
DNS RFC growth chart

Because DNS traffic reflects almost all Internet activities, analyzing DNS data can reveal malicious behavior. The article discusses two main uses: network measurement and security analysis.

2 Network Measurement

DNS Hijacking

DNS requests are mostly plaintext over UDP, making hijacking common. A joint measurement by Tsinghua University and 360 quantified global DNS hijacking using randomized subdomains across public resolvers, revealing that 8.5% of autonomous systems experience hijacking, with UDP packets more vulnerable, A‑type queries slightly higher, and primary motives likely financial and performance‑related.

DNS hijacking measurement results
DNS hijacking measurement results

Measuring NTP pool usage

Using DNS data, the NTP pool was measured, finding about 4,000 servers (25% IPv6) distributed across 97 countries, with only 2% located in China, mainly in economically developed regions. Subdomains are organized by continent, country/region, and provider; about 3% of requests are invalid due to typos or bugs. Provider‑based request statistics reveal usage patterns.

NTP pool server distribution
NTP pool server distribution

Other measurements

Passive DNS (PDNS) enables large‑scale measurements such as CDN size evaluation, black‑gray market assessment, new gTLD usage, domain registration and policy compliance, among others.

3 Security Analysis

DNS security analysis falls into two categories: attacks on the DNS protocol/system (e.g., poisoning, hijacking, pseudo‑random prefix DoS, NXNSAttack) and using DNS data to detect malicious activities (e.g., DNS tunneling, reflection amplification, DGA, Fastflux).

DNSMon – Threat Detection System

360’s DNSMon processes millions of DNS queries per second, correlates multi‑dimensional data, and applies deep‑learning models (word2vec, LSTM) to label malicious domains in near real‑time, automatically generating thousands of black‑ and high‑risk domains daily. Detected threats include mining worms, botnets, ad‑fraud campaigns, and other malicious software.

DNSMon architecture
DNSMon architecture

4 Summary

DNS is evolving toward greater privacy and security, and DNS data analysis is increasingly vital for both protocol measurement and threat intelligence. Exploring DNS as a rich data source offers significant opportunities for network measurement and security research.

DNSthreat detectionnetwork measurementpassive DNSsecurity analysisNTP pool
360 Zhihui Cloud Developer
Written by

360 Zhihui Cloud Developer

360 Zhihui Cloud is an enterprise open service platform that aims to "aggregate data value and empower an intelligent future," leveraging 360's extensive product and technology resources to deliver platform services to customers.

0 followers
Reader feedback

How this landed with the community

login Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.