A distributed intrusion detection model for the domain name system

Chang-Sheng Chen*, Shian Shyong Tseng, Chien-Liang Liu

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

2 Scopus citations


We have investigated the problem of detecting DoS-like DNS anomalies in DNS system. In this paper, we propose a distributed Two-phase DNS anomaly detection model for solving the problem. Three sets of algorithms corresponding to different configurations are proposed, including one sequential algorithm and two distributed algorithms, each with an increasing level of parallelism. The complexity of these algorithms have been found to be O (n log n). The distributed algorithms show at least a constant (1-1/Ck), Ck > 1, improvement over the sequential one. To evaluate the performance, we have implemented the algorithms and applied them to a number of examples. The experimental result shows a speed up of about 1.68 on the test example for running on an enhanced distributed architecture with C-IDS over the sequential one. A higher speed up might be common because DNS anomalies will make the traffic distribution more concentrated on the outliers, and the computation will usually converge much more quickly.

Original languageEnglish
Pages (from-to)999-1009
Number of pages11
JournalJournal of Information Science and Engineering
Issue number6
StatePublished - 1 Nov 2002


  • DNS
  • Distributed two-phase DNS anomaly detection
  • DoS
  • IDS
  • Two-phase anomaly detection algorithms


Dive into the research topics of 'A distributed intrusion detection model for the domain name system'. Together they form a unique fingerprint.

Cite this