{"id":"https://openalex.org/W4405935679","doi":"https://doi.org/10.23919/cnsm62983.2024.10814277","title":"Is a Name Enough? A First Look into Detecting Clouds Using DNS Pointer Records","display_name":"Is a Name Enough? A First Look into Detecting Clouds Using DNS Pointer Records","publication_year":2024,"publication_date":"2024-10-28","ids":{"openalex":"https://openalex.org/W4405935679","doi":"https://doi.org/10.23919/cnsm62983.2024.10814277"},"language":"en","primary_location":{"id":"doi:10.23919/cnsm62983.2024.10814277","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cnsm62983.2024.10814277","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 20th International Conference on Network and Service Management (CNSM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://research.utwente.nl/en/publications/267dc668-006c-4264-a9f8-470ff9aa0c5f","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056261980","display_name":"Sousan Tarahomi","orcid":null},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Sousan Tarahomi","raw_affiliation_strings":["University of Twente,Enschede,The Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente,Enschede,The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002961985","display_name":"Raffaele Sommese","orcid":"https://orcid.org/0000-0003-3484-9259"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Raffaele Sommese","raw_affiliation_strings":["University of Twente,Enschede,The Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente,Enschede,The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085616535","display_name":"Pieter-Tjerk de Boer","orcid":"https://orcid.org/0000-0002-0818-5295"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Pieter-Tjerk de Boer","raw_affiliation_strings":["University of Twente,Enschede,The Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente,Enschede,The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076142443","display_name":"Jeroen Linssen","orcid":"https://orcid.org/0000-0002-2626-1837"},"institutions":[{"id":"https://openalex.org/I2801398864","display_name":"Saxion University of Applied Sciences","ror":"https://ror.org/005t9n460","country_code":"NL","type":"education","lineage":["https://openalex.org/I2801398864"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Jeroen Linssen","raw_affiliation_strings":["Saxion University of Applied Sciences,Enschede,The Netherlands"],"affiliations":[{"raw_affiliation_string":"Saxion University of Applied Sciences,Enschede,The Netherlands","institution_ids":["https://openalex.org/I2801398864"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005480813","display_name":"Ralph Holz","orcid":"https://orcid.org/0000-0001-9614-2377"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Ralph Holz","raw_affiliation_strings":["University of Twente,Enschede,The Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente,Enschede,The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025537461","display_name":"Anna Sperotto","orcid":"https://orcid.org/0000-0002-9481-5846"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Anna Sperotto","raw_affiliation_strings":["University of Twente,Enschede,The Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Twente,Enschede,The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5056261980"],"corresponding_institution_ids":["https://openalex.org/I94624287"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.28449507,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/pointer","display_name":"Pointer (user interface)","score":0.7112454175949097},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7063183784484863},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17617690563201904}],"concepts":[{"id":"https://openalex.org/C150202949","wikidata":"https://www.wikidata.org/wiki/Q107602","display_name":"Pointer (user interface)","level":2,"score":0.7112454175949097},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7063183784484863},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17617690563201904}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.23919/cnsm62983.2024.10814277","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cnsm62983.2024.10814277","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 20th International Conference on Network and Service Management (CNSM)","raw_type":"proceedings-article"},{"id":"pmh:oai:ris.utwente.nl:openaire/267dc668-006c-4264-a9f8-470ff9aa0c5f","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/267dc668-006c-4264-a9f8-470ff9aa0c5f","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Tarahomi, S, Sommese, R, de Boer, P-T, Linssen, J, Holz, R & Sperotto, A 2024, Is a Name Enough? A First Look into Detecting Clouds Using DNS Pointer Records. in 2024 20th International Conference on Network and Service Management (CNSM)., 10814277, International Conference on Network and Service Management, IEEE Advancing Technology for Humanity, pp. 1-5, 20th International Conference on Network and Service Management, CNSM 2024 , Prague, Czech Republic, 28/10/24. https://doi.org/10.23919/CNSM62983.2024.10814277","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:ris.utwente.nl:openaire/267dc668-006c-4264-a9f8-470ff9aa0c5f","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/267dc668-006c-4264-a9f8-470ff9aa0c5f","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Tarahomi, S, Sommese, R, de Boer, P-T, Linssen, J, Holz, R & Sperotto, A 2024, Is a Name Enough? A First Look into Detecting Clouds Using DNS Pointer Records. in 2024 20th International Conference on Network and Service Management (CNSM)., 10814277, International Conference on Network and Service Management, IEEE Advancing Technology for Humanity, pp. 1-5, 20th International Conference on Network and Service Management, CNSM 2024 , Prague, Czech Republic, 28/10/24. https://doi.org/10.23919/CNSM62983.2024.10814277","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2018645873","https://openalex.org/W2070414912","https://openalex.org/W2344804892","https://openalex.org/W2769335860","https://openalex.org/W2999350303","https://openalex.org/W3093709032","https://openalex.org/W3217153411","https://openalex.org/W4200468793","https://openalex.org/W4306406207","https://openalex.org/W4307020326","https://openalex.org/W4324009512","https://openalex.org/W4389613187"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W2387387477","https://openalex.org/W4396701345","https://openalex.org/W2394051415","https://openalex.org/W2376932109"],"abstract_inverted_index":{"The":[0],"flexibility":[1],"and":[2,65,95,115],"scalability":[3],"of":[4,22,34,76,123,138,169],"cloud":[5,25,104,124,130,164],"services":[6],"have":[7],"led":[8],"to":[9,19,55,100,112,162],"their":[10,35,67,79],"adoption":[11],"across":[12],"various":[13],"industries.":[14],"While":[15],"it":[16,59],"is":[17,39,60,71],"easy":[18],"identify":[20,101,113,163],"deployments":[21,165],"very":[23],"large":[24],"providers":[26,54],"(hypergiants)":[27],"as":[28],"they":[29],"often":[30,133],"publish":[31],"the":[32,43,74,102,118],"allocation":[33],"network":[36,98,160],"resources,":[37],"this":[38,57,83],"much":[40],"less":[41],"commonly":[42],"case":[44],"for":[45],"smaller":[46],"providers.":[47,125],"Despite":[48],"efforts":[49],"by":[50,73,97,159],"commercial":[51],"IP":[52,103,140],"intelligence":[53],"bridge":[56],"gap,":[58],"not":[61],"clear":[62],"how":[63],"complete":[64],"reliable":[66],"data":[68,92],"is,":[69],"which":[70],"compounded":[72],"lack":[75],"transparency":[77],"surrounding":[78],"identification":[80],"methods.":[81],"In":[82],"early":[84],"study,":[85],"we":[86],"utilize":[87],"reverse":[88,119],"DNS,":[89],"a":[90,108],"public":[91],"source":[93],"provided":[94],"used":[96,158],"operators,":[99],"space.":[105],"We":[106,151],"develop":[107],"Markov":[109],"chain-based":[110],"classifier":[111],"patterns":[114],"structures":[116],"in":[117],"DNS":[120],"naming":[121,132],"schemes":[122],"Our":[126],"results":[127],"indicate":[128],"that":[129,137,147,153],"infrastructure":[131],"differs":[134],"significantly":[135],"from":[136],"residential":[139],"space,":[141],"although":[142],"there":[143],"are":[144],"some":[145],"overlaps":[146],"require":[148],"further":[149],"investigation.":[150],"believe":[152],"our":[154],"model":[155],"can":[156],"be":[157],"operators":[161],"with":[166],"varying":[167],"levels":[168],"confidence.":[170]},"counts_by_year":[],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
