<node id="682557">
  <nid>682557</nid>
  <type>event</type>
  <uid>
    <user id="28475"><![CDATA[28475]]></user>
  </uid>
  <created>1748414104</created>
  <changed>1748414215</changed>
  <title><![CDATA[Ph.D. Proposal Oral Exam - Aaron Faulkenberry]]></title>
  <body><![CDATA[<p><strong>Title:&nbsp; </strong><em>Internet-Scale Discovery and Measurement of DNS Monitoring for Cyber Threats</em></p><p><strong>Committee:</strong></p><p>Dr. Antonakakis, Advisor</p><p>Dr. Monrose, Chair</p><p>Dr. Keromytis</p><p>Dr. Perdisci</p><p>Dr. Ma</p>]]></body>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Internet-Scale Discovery and Measurement of DNS Monitoring for Cyber Threats]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>The object of the proposed research is to understand how the security community tracks the domain infrastructure of cyber threats to uncover blind spots that adversaries exploit to hide their attacks. Our findings come from internet-scale measurement and analysis of real-world DNS monitoring deployments. First, we find evidence of DNS monitoring by security entities in the upper DNS hierarchy for malware-related domains, and our temporal analysis suggests that these monitors may lack visibility into the early stages of attacks. In response, we designed and implemented a novel system that stimulates reactive DNS monitoring deployments in networks across IPv4. Our system reveals DNS monitoring affecting tens of thousands of autonomous systems and includes the characterization of automated analysis pipelines, which provide sweeping monitoring coverage across distinct networks. However, various monitoring implementations left room for attackers to profile monitors and undermine the security community's defenses. As remaining work, we propose designing a new study to illuminate proactive DNS monitoring and uncover security community blind spots of malicious infrastructure during its provisioning.</p>]]></value>
    </item>
  </field_summary>
  <field_time>
    <item>
      <value><![CDATA[2025-05-29T16:00:00-04:00]]></value>
      <value2><![CDATA[2025-05-29T18:00:00-04:00]]></value2>
      <rrule><![CDATA[]]></rrule>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_time>
  <field_fee>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_fee>
  <field_extras>
      </field_extras>
  <field_audience>
          <item>
        <value><![CDATA[Public]]></value>
      </item>
      </field_audience>
  <field_media>
      </field_media>
  <field_contact>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_contact>
  <field_location>
    <item>
      <value><![CDATA[Room 3402, Klaus]]></value>
    </item>
  </field_location>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_phone>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_phone>
  <field_url>
    <item>
      <url><![CDATA[]]></url>
      <title><![CDATA[]]></title>
            <attributes><![CDATA[]]></attributes>
    </item>
  </field_url>
  <field_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_email>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>434371</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[ECE Ph.D. Proposal Oral Exams]]></item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>1788</tid>
        <value><![CDATA[Other/Miscellaneous]]></value>
      </item>
      </field_categories>
  <field_keywords>
          <item>
        <tid>102851</tid>
        <value><![CDATA[Phd proposal]]></value>
      </item>
          <item>
        <tid>1808</tid>
        <value><![CDATA[graduate students]]></value>
      </item>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
