skip to main content
10.1145/3355369.3355598acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
research-article

Prefix Top Lists: Gaining Insights with Prefixes from Domain-based Top Lists on DNS Deployment

Published: 21 October 2019 Publication History

Abstract

Domain-based top lists such as the Alexa Top 1M strive to portray the popularity of web domains. Even though their shortcomings (e.g., instability, no aggregation, lack of weights) have been pointed out, domain-based top lists still are an important element of Internet measurement studies.
In this paper we present the concept of prefix top lists, which ameliorate some of the shortcomings, while providing insights into the importance of addresses of domain-based top lists. With prefix top lists we aggregate domain-based top lists into network prefixes and apply a Zipf distribution to assign weights to each prefix. In our analysis we find that different domain-based top lists provide differentiated views on Internet prefixes. In addition, we observe very small weight changes over time. We leverage prefix top lists to conduct an evaluation of the DNS to classify the deployment quality of domains. We show that popular domains adhere to name server recommendations for IPv4, but IPv6 compliance is still lacking. Finally, we provide these enhanced and more stable prefix top lists to fellow researchers which can use them to obtain more representative measurement results.

References

[1]
Lada A Adamic and Bernardo A Huberman. 2002. Zipf's law and the Internet. Glottometrics 3, 1 (2002), 143--150.
[2]
Alexa. May 13, 2019. Top 1M sites. https://www.alexa.com/topsites. http://s3.dualstack.us-east-1.amazonaws.com/alexa-static/top-1m.csv.zip.
[3]
Alexa. May 13, 2019. What's going on with my Alexa Rank? https://support.alexa.com/hc/en-us/articles/200449614.
[4]
Mark Allman. 2018. Comments On DNS Robustness. In Proceedings of the Internet Measurement Conference 2018. ACM. https://doi.org/10.1145/3278532.3278541
[5]
Mark Allman and Vern Paxson. 2007. Issues and Etiquette Concerning Use of Shared Measurement Data. In Proceedings of the Internet Measurement Conference 2007. ACM. https://doi.org/10.1145/1298306.1298327
[6]
Tim Berners-Lee. 1998. The Fractal nature of the Web. http://edshare.soton.ac.uk/392/3/DesignIssues/Fractal.html.
[7]
Stéphane Bortzmeyer. 2016. DNS Query Name Minimisation to Improve Privacy. RFC 7816 (Experimental). https://doi.org/10.17487/RFC7816
[8]
Cisco. May 13, 2019. Umbrella Top 1M List. https://umbrella.cisco.com/blog/blog/2016/12/14/cisco-umbrella-1-million/.
[9]
David Dittrich, Erin Kenneally, et al. 2012. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. US Department of Homeland Security (2012).
[10]
Robert Elz, Randy Bush, Scott Bradner, and Michael Patton. 1997. Selection and Operation of Secondary DNS Servers. RFC 2182 (Best Current Practice). https://doi.org/10.17487/RFC2182
[11]
Oliver Gasser, Quirin Scheitle, Pawel Foremski, Qasim Lone, Maciej Korczynski, Stephen D. Strowes, Luuk Hendriks, and Georg Carle. 2018. Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists. In Proceedings of the Internet Measurement Conference 2018. ACM. https://doi.org/10.1145/3278532.3278564
[12]
Oliver Gasser, Quirin Scheitle, Sebastian Gebhard, and Georg Carle. 2016. Scanning the IPv6 Internet: Towards a Comprehensive Hitlist. In Proceedings of the Traffic Monitoring and Analysis Workshop 2016.
[13]
Jeremy Kepner, Kenjiro Cho, and KC Claffy. 2019. New Phenomena in Large-Scale Internet Traffic. arXiv:cs.NI/1904.04396
[14]
Serge A Krashakov, Anton B Teslyuk, and Lev N Shchur. 2006. On the universality of rank distributions of website popularity. Computer Networks 50, 11 (2006), 1769--1780.
[15]
Victor Le Pochat, Tom Van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczyński, and Wouter Joosen. 2019. Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation. In Proceedings of the Network and Distributed System Security Symposium 2019. Internet Society.
[16]
Victor Le Pochat, Tom Van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczyński, and Wouter Joosen. May 13, 2019. Tranco List. https://tranco-list.eu/.
[17]
Majestic. May 13, 2019. The Majestic Million. https://majestic.com/reports/majestic-million/.
[18]
University of Oregon. 2019. Route Views Project. http://www.routeviews.org
[19]
Craig Partridge and Mark Allman. 2016. Ethical Considerations in Network Measurement Papers. Commun. ACM (2016). https://doi.org/10.1145/2896816
[20]
Walter Rweyemamu, Tobias Lauinger, Christo Wilson, William Robertson, and Engin Kirda. 2019. Clustering and the Weekend Effect: Recommendations for the Use of Top Domain Lists in Security Research. In Proceedings of the Passive and Active Measurement Conference 2019.
[21]
Quirin Scheitle, Oliver Hohlfeld, Julien Gamba, Jonas Jelten, Torsten Zimmermann, Stephen D. Strowes, and Narseo Vallina-Rodriguez. 2018. A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists. In Proceedings of the Internet Measurement Conference 2018. ACM. https://doi.org/10.1145/3278532.3278574

Cited By

View all
  • (2024)C2-DNSWatch: Endpoint Framework for Detecting Command and Control (C2) Connection of Advanced Persistent Threats (APTs)2024 13th International Conference on Communications, Circuits and Systems (ICCCAS)10.1109/ICCCAS62034.2024.10652798(64-69)Online publication date: 10-May-2024
  • (2024)C2-Eye: framework for detecting command and control (C2) connection of supply chain attacksInternational Journal of Information Security10.1007/s10207-024-00850-y23:4(2531-2545)Online publication date: 1-Aug-2024
  • (2022)Toppling top listsProceedings of the 22nd ACM Internet Measurement Conference10.1145/3517745.3561444(374-387)Online publication date: 25-Oct-2022
  • Show More Cited By

Index Terms

  1. Prefix Top Lists: Gaining Insights with Prefixes from Domain-based Top Lists on DNS Deployment

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    IMC '19: Proceedings of the Internet Measurement Conference
    October 2019
    497 pages
    ISBN:9781450369480
    DOI:10.1145/3355369
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 21 October 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Internet Measurement
    2. Internet Top Lists
    3. Prefix Ranking
    4. Prefix Top Lists

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Funding Sources

    • Bundesministerium für Bildung und Forschung

    Conference

    IMC '19
    IMC '19: ACM Internet Measurement Conference
    October 21 - 23, 2019
    Amsterdam, Netherlands

    Acceptance Rates

    IMC '19 Paper Acceptance Rate 39 of 197 submissions, 20%;
    Overall Acceptance Rate 277 of 1,083 submissions, 26%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)45
    • Downloads (Last 6 weeks)9
    Reflects downloads up to 18 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)C2-DNSWatch: Endpoint Framework for Detecting Command and Control (C2) Connection of Advanced Persistent Threats (APTs)2024 13th International Conference on Communications, Circuits and Systems (ICCCAS)10.1109/ICCCAS62034.2024.10652798(64-69)Online publication date: 10-May-2024
    • (2024)C2-Eye: framework for detecting command and control (C2) connection of supply chain attacksInternational Journal of Information Security10.1007/s10207-024-00850-y23:4(2531-2545)Online publication date: 1-Aug-2024
    • (2022)Toppling top listsProceedings of the 22nd ACM Internet Measurement Conference10.1145/3517745.3561444(374-387)Online publication date: 25-Oct-2022
    • (2022)Peering Only? Analyzing the Reachability Benefits of Joining Large IXPs TodayPassive and Active Measurement10.1007/978-3-030-98785-5_15(338-366)Online publication date: 22-Mar-2022
    • (2021)Deployment and scalability of an inter-domain multi-path routing infrastructureProceedings of the 17th International Conference on emerging Networking EXperiments and Technologies10.1145/3485983.3494862(126-140)Online publication date: 2-Dec-2021
    • (2021)Hunting BGP zombies in the wildProceedings of the 2021 Applied Networking Research Workshop10.1145/3472305.3472315(1-7)Online publication date: 24-Jul-2021
    • (2021)Privacy Policies over Time: Curation and Analysis of a Million-Document DatasetProceedings of the Web Conference 202110.1145/3442381.3450048(2165-2176)Online publication date: 19-Apr-2021
    • (2021)SoK: A Framework for Asset Discovery: Systematizing Advances in Network Measurements for Protecting Organizations2021 IEEE European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP51992.2021.00037(440-456)Online publication date: Sep-2021

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media