Docs
test1test2
6.5
6.5
  • ElastiFlow Documentation
  • Unified Flow Collector
    • General Configuration
    • Changelog
    • Maxmind GeoIP2 and GeoLite2
    • RiskIQ PassiveTotal
    • Network Interfaces
    • User-Defined Metadata
    • Docker
    • Linux
    • Unified Flow Collector Introduction
    • System Requirements
    • Supported IEs
    • AWS VPC Flow Log IEs
    • IPFIX IEs
    • Netflow IEs
    • sFlow IEs
  • Unified SNMP Collector
    • Device Groups
    • Changelog
    • Devices
    • Downloading Definitions
    • Enumerations
    • Objects
    • Object Groups
    • User-Defined Metadata
    • Docker
    • Network Interfaces
    • United SNMP Collector Introduction
    • Linux
    • Scheduling Rediscovery
  • Monitoring ElastiFlow
    • Liveness & Readiness
    • Metrics
    • Prometheus & Grafana
  • Configuration Reference
    • YAML Configuration Files
    • Configuration Reference Overview
    • Common
      • API
      • Licensing
      • Overview
      • Logging
      • HTTP output
      • Elasticsearch output
      • Kafka output
      • Monitor output
      • OpenSearch output
      • Splunk output
      • stdout output
      • Processor
    • Unified Flow Collector
      • Overview
      • Community/Conversation IDs
      • EF_PROCESSOR_ENRICH_TOTALS_IF_NO_DELTAS
      • Overview
      • RiskIQ PassiveTotal
      • Maxmind
      • User-Defined Metadata
      • Overview
      • Overview
      • User-Defined Metadata
      • Overview
      • Benchmark Input
      • Netflow/IPFIX/sFlow (UDP)
      • Licensing
      • Decoder/Processor
      • Sample Rate
      • Configuration Changes
    • Unified SNMP Collector
      • User-Defined Metadata
      • Overview
      • Licensing
      • SNMP Poller
      • EF_PROCESSOR_SNMP_ENUM_DEFINITIONS_DIRECTORY_PATH
  • API Reference
    • API Reference Overview
    • SNMP Operations
  • Data Platforms
    • Elastic
      • Basic Cluster
      • Advanced Cluster
      • Single Server
      • Multi-Tier Cluster
      • Single "Lab" Server
      • Elasticsearch
      • ElastiFlow vs. Filebeat and Logstash
      • RHEL/CentOS
      • Ubuntu/Debian
      • Kibana
      • ML
        • Network Security
        • Machine Learning
        • Availability
          • Network Availability
          • DHCP
          • LDAP
          • DNS
          • NTP
          • RADIUS
          • TCP Sessions
        • Network Security Activity
          • Rare Autonomous System
          • Network Activity
          • Rare Conversation
          • Rare Geolocation
        • Network Security Brute Force
          • Brute Force CLI Access
          • Brute Force Remote Desktop Access
          • Brute Force Attacks
        • Network Security DDoS
          • Denial-of-Service
          • ICMP Flood Attack
          • SYN Flood Attack
          • TCP DDoS Attack
          • UDP Amplification Attack
        • Network Security Recon
          • ICMP Scan
          • Reconnaissance
          • Port Scan
        • Performance
          • Unusual ASN Traffic Volume
          • Unusual Network Interface Traffic Volume
          • Network Performance
    • Opensearch
      • Dashboards
      • Auth Sig V4
    • Splunk
      • Default Search Macro
      • Configuring Data Input & Index
      • Splunk App Installation
    • Output Configuration
  • Additional Guides
    • Catalyst (sFlow)
    • FortiGate
    • hsflowd
    • Configuring Flow Sampling on Juniper Routers
    • Junos OS (sFlow)
    • MikroTik RouterOS
    • OpenWRT (softflowd)
    • Ubiquiti EdgeRouter
    • SonicWall
    • Junos OS
    • Extending SNMP Device Support
    • Flow Device Support Overview
    • SNMP Device Support Overview
    • Generating A Support Bundle
  • FAQ
    • Flows stopped showing up in Kibana (Disk(s) Full)
    • Common reasons why you have discrepancies between ElastiFlow data & reality
    • What Are Snapshots?
    • Importing the wrong dashboards (No data)
  • Knowledge Base
    • Config
      • Elasticsearch Authentication Failure
      • CA Certificate Path Incorrect
      • license/error Invalid Segments
    • Flow
      • Bidirectional Flow Support
      • Configure the UDP Input
      • Flow Records Not Received
      • Netflow v9/IPFIX Template Not Receieved
      • Unsupported sFlow Structures
    • General
      • License Has Expired
      • License Agreement Not Accepted
    • Install
      • .deb Upgrade Fails File Overwrite
    • Operation
      • Flow Collector Queues 90% Full
      • Dashboard Updates
      • Change elastiflow-* Index Name?
  • Elastic Stack Deployment
  • Download Links
Powered by GitBook
On this page
  • Low DNS Request/Response Ratio
  • Low DNS Responses
  1. Data Platforms
  2. Elastic
  3. ML
  4. Availability

DNS

PreviousLDAPNextNTP

The Domain Name System (DNS) is a critical component of the Internet, serving as the protocol that translates human-readable domain names (like ) into the numerical IP addresses that computers use to communicate with each other. Whenever you type a website address into your browser, DNS servers take that domain name and translate it into the corresponding IP address so your browser can load the website. This process is essential for the functionality of the internet, allowing users to access websites and services using easy-to-remember domain names instead of having to remember complex numerical IP addresses. The DNS protocol operates globally, maintained by a distributed database system across numerous servers worldwide, ensuring the scalability and robustness of internet addressing.

DNS functions as a request/response protocol. When a user attempts to access a website, their computer (the client) sends a DNS query to a DNS server, requesting the IP address associated with the website's domain name. The DNS server then responds with the corresponding IP address, allowing the user's computer to establish a connection to the website's host server. By analyzing DNS request and response messages across a network, IT professionals can detect and troubleshoot disruptions or anomalies in the DNS service. This analysis is crucial because issues with DNS can prevent users from accessing websites and online services, leading to significant disruptions. For instance, a high volume of unresolved DNS requests might indicate a network configuration issue or a malicious attack like a Distributed Denial of Service (DDoS), emphasizing the importance of monitoring DNS traffic for maintaining network integrity and performance.

Low DNS Request/Response Ratio

The Low DNS Request/Response Ratio anomaly detection job is designed to monitor the balance and volume of Domain Name System (DNS) request and response messages within a network. The DNS protocol is pivotal for translating human-readable domain names into IP addresses, which are necessary for routing and accessing internet resources. Under normal circumstances, there is a relatively consistent flow of DNS requests sent from clients to DNS servers, and corresponding responses are received from these servers.

An unusually low volume of DNS messages, or a significant imbalance between requests and responses, can be indicative of several network-related issues:

  • DNS Server Issues: A primary concern is the potential malfunction, overload, or misconfiguration of DNS servers. If a server is unable to cope with the volume of incoming requests due to performance limitations or incorrect settings, it may result in fewer responses or delayed responses. This can lead to resolution failures, where users are unable to access websites or online services.

  • Network Connectivity Problems: Connectivity issues within the network can disrupt the flow of DNS traffic. If DNS requests are not reaching the server due to network hardware failures, misconfigured routes, or broken links, or if responses are failing to reach the clients, this will result in a lower ratio of responses to requests.

  • Security Threats: A low request/response ratio might also indicate security threats such as Denial of Service (DoS) attacks targeting DNS servers or infrastructure. These attacks can flood servers with excessive requests, thereby preventing them from handling legitimate traffic effectively.

  • Client Configuration Issues: Problems with client configurations, such as incorrect DNS settings or the use of outdated or unsupported DNS protocols, can lead to a decrease in successful DNS requests, contributing to an imbalance in the request/response ratio.

Attributes

Attribute
Information

Analysis

temporal

Downloads

Schema
Link

CODEX

ECS

Low DNS Responses

The Low DNS Responses anomaly detection job is focused on identifying instances where there is an unusually low volume of DNS response messages in a network. The DNS (Domain Name System) is a foundational internet service that translates domain names into IP addresses, facilitating the routing of internet traffic. Normally, each DNS query (request) from a client is met with a corresponding response from a DNS server, indicating the IP address associated with the requested domain name or providing an error if the domain cannot be resolved.

A significant reduction in the volume of DNS response messages can suggest various issues:

  • DNS Server Overload or Failure: If DNS servers are overwhelmed due to high traffic volumes or are experiencing operational failures (hardware or software issues), they may be unable to respond adequately to incoming queries. This can result in a noticeable drop in response messages, leading to unresolved queries and access issues for users trying to navigate to websites or use internet services.

  • Network Connectivity or Configuration Issues: Problems in network connectivity can interfere with the transmission of DNS responses. This could include misconfigured network devices, such as routers or firewalls, that inadvertently block or misroute DNS responses, or physical connectivity problems like broken cables or malfunctioning switches.

  • Security Incidents: Anomalously low DNS responses can also indicate security incidents, such as Denial of Service (DoS) attacks targeting DNS infrastructure. These attacks can disrupt the normal operation of DNS servers, preventing them from responding to legitimate queries.

  • Client-Side DNS Issues: On the client side, issues such as misconfigured DNS settings or network policies that restrict DNS traffic can result in a failure to receive responses, even though requests are being sent out.

Attributes

Attribute
Information

Analysis

temporal

Downloads

Schema
Link

CODEX

ECS

www.elastiflow.com
elastiflow_codex_avail_dns_resp_ratio_low
elastiflow_ecs_avail_dns_resp_ratio_low
elastiflow_codex_avail_dns_resp_low
elastiflow_ecs_avail_dns_resp_low