摘要: This paper presents an alternative fingerprinting technique to identify DNS software running on caching resolvers in passively collected traffic traces. With this method, it is not required send additional queries during the measurement, unlike existing techniques that rely probing and may be effective due firewall filtering or refused responses.We first carefully examine query patterns upon specific emulation extract 15 heuristic rules from experiment typical (i.e., BIND, Unbound Windows Server). We next demonstrate effectiveness of using real backbone traces with ground truth data. The results show 99% accuracy compared truth. Furthermore, 78% unknown hosts can identified.