{"id":1158,"date":"2018-02-22T16:34:41","date_gmt":"2018-02-23T00:34:41","guid":{"rendered":"https:\/\/ant.isi.edu\/blog\/?p=1158"},"modified":"2020-10-14T15:39:07","modified_gmt":"2020-10-14T22:39:07","slug":"new-talk-enumerating-privacy-leaks-in-dns-data-collected-above-the-recursive-at-ndss-dns-privacy-workshop-2018","status":"publish","type":"post","link":"https:\/\/ant.isi.edu\/blog\/?p=1158","title":{"rendered":"New paper and talk \u201cEnumerating Privacy Leaks in DNS Data Collected above the Recursive\u201d at NDSS DNS Privacy Workshop 2018"},"content":{"rendered":"<p class=\"p1\">Basileal Imana presented the paper \u201cEnumerating Privacy Leaks in DNS Data Collected<span class=\"Apple-converted-space\">&nbsp; <\/span>above the Recursive\u201d at NDSS DNS Privacy Workshop in San Diego, California, USA on February 18, 2018. Talk slides are available at <a href=\"https:\/\/ant.isi.edu\/~imana\/presentations\/Imana18b.pdf\"><span class=\"s1\">https:\/\/ant.isi.edu\/~imana\/presentations\/Imana18b.pdf<\/span><\/a> and paper is available at<span class=\"Apple-converted-space\">&nbsp; <\/span><a href=\"https:\/\/ant.isi.edu\/~imana\/papers\/Imana18a.pdf\"><span class=\"s1\">https:\/\/ant.isi.edu\/~imana\/papers\/Imana18a.pdf<\/span><\/a>, or can be found at the <a href=\"https:\/\/dnsprivacy.org\/wiki\/display\/DNSPWS\/NDSS%3A+DNS+Privacy+Workshop+2018\"><span class=\"s2\">DNS privacy workshop page<\/span><\/a><span class=\"s2\">.<\/span><\/p>\n<p>From the abstract:<\/p>\n<figure id=\"attachment_1161\" aria-describedby=\"caption-attachment-1161\" style=\"width: 464px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2018\/02\/ndss_dprive_workshop.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-1161\" src=\"https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2018\/02\/ndss_dprive_workshop-300x117.png\" alt=\"\" width=\"464\" height=\"181\" srcset=\"https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2018\/02\/ndss_dprive_workshop-300x117.png 300w, https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2018\/02\/ndss_dprive_workshop-1024x399.png 1024w, https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2018\/02\/ndss_dprive_workshop-768x299.png 768w, https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2018\/02\/ndss_dprive_workshop-1536x598.png 1536w, https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2018\/02\/ndss_dprive_workshop.png 1802w\" sizes=\"auto, (max-width: 464px) 100vw, 464px\" \/><\/a><figcaption id=\"caption-attachment-1161\" class=\"wp-caption-text\">Threat model for enumerating leaks above the recursive (left). Percentage of four categories of queries containing IPv4 addresses in their QNAMEs. (right)<\/figcaption><\/figure>\n<blockquote>\n<p class=\"p1\" style=\"text-align: left;\">As with any information system consisting of data derived from people\u2019s actions, DNS data is vulnerable to privacy risks. In DNS, users make queries through recursive resolvers to authoritative servers. Data collected below (or in) the recursive resolver directly exposes users, so most prior DNS data sharing focuses on queries above the recursive resolver. Data collected above a recursive resolver has largely been seen as posing a minimal privacy risk since recursive resolvers typically aggregate traffic for many users, thereby hiding their identity and mixing their traffic. Although this assumption is widely made, to our knowledge it has not been verified. In this paper we re-examine this assumption for DNS traffic above the recursive resolver. First, we show that two kinds of information appear in query names above the recursive resolver: IP addresses and sensitive domain names, such as those pertaining to health, politics, or personal or lifestyle information. Second, we examine how often these classes of potentially sensitive names appear in Root DNS traffic, using 48 hours of B-Root data from April 2017.<\/p>\n<\/blockquote>\n<p class=\"p1\">This is a joint work by Basileal Imana (USC), Aleksandra Korolova (USC) and John Heidemann (USC\/ISI).<\/p>\n<p>The DITL dataset (<a name=\"DITL_B_Root-20170411\"><\/a>ITL_B_Root-20170411) used in this work is available from <a href=\"https:\/\/impactcybertrust.org\/\">DHS IMPACT<\/a>, the <a href=\"https:\/\/ant.isi.edu\/datasets\/all.html\">ANT project,<\/a> and through <a href=\"https:\/\/www.dns-oarc.net\/oarc\/data\/ditl\">DNS-OARC<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Basileal Imana presented the paper \u201cEnumerating Privacy Leaks in DNS Data Collected&nbsp; above the Recursive\u201d at NDSS DNS Privacy Workshop in San Diego, California, USA on February 18, 2018. Talk slides are available at https:\/\/ant.isi.edu\/~imana\/presentations\/Imana18b.pdf and paper is available at&nbsp; https:\/\/ant.isi.edu\/~imana\/papers\/Imana18a.pdf, or can be found at the DNS privacy workshop page. From the abstract: As [&hellip;]<\/p>\n","protected":false},"author":636,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[289,284,280,282],"tags":[63,157,58,67,22,196,10,29,161,5,93,142,170,18,49,92,57,38],"class_list":["post-1158","post","type-post","status-publish","format-standard","hentry","category-dns","category-papers-publications","category-presentations","category-publications","tag-dns","tag-impact","tag-isi","tag-lacrend","tag-measurement-systems","tag-ndss","tag-network-datasets","tag-network-traffic","tag-nipet","tag-papers","tag-privacy","tag-researchroot","tag-retrofuturebridge","tag-security","tag-talks","tag-tls","tag-usc","tag-workshop"],"_links":{"self":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1158","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1158"}],"version-history":[{"count":10,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1158\/revisions"}],"predecessor-version":[{"id":1711,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1158\/revisions\/1711"}],"wp:attachment":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1158"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1158"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}