<s>
DNS	B-Protocol
Analytics	I-Protocol
is	O
the	O
surveillance	O
(	O
collection	O
and	O
analysis	O
)	O
of	O
DNS	B-Protocol
traffic	O
within	O
a	O
computer	B-Architecture
network	I-Architecture
.	O
</s>
<s>
Such	O
analysis	O
of	O
DNS	B-Protocol
traffic	O
has	O
a	O
significant	O
application	O
within	O
information	O
security	O
and	O
computer	O
forensics	O
,	O
primarily	O
when	O
identifying	O
insider	O
threats	O
,	O
malware	O
,	O
cyberweapons	O
,	O
and	O
advanced	O
persistent	O
threat	O
(	O
APT	O
)	O
campaigns	O
within	O
computer	B-Architecture
networks	I-Architecture
.	O
</s>
<s>
Since	O
DNS	B-Protocol
Analytics	I-Protocol
processes	O
and	O
interactions	O
involve	O
the	O
communications	O
between	O
DNS	B-Protocol
clients	O
and	O
DNS	B-Protocol
servers	O
during	O
the	O
resolution	O
of	O
DNS	B-Protocol
queries	I-Protocol
and	O
updates	O
,	O
it	O
may	O
include	O
tasks	O
such	O
as	O
request	O
logging	O
,	O
historical	O
monitoring	O
by	O
node	O
,	O
tabulation	O
of	O
request	O
count	O
quantities	O
,	O
and	O
calculations	O
based	O
on	O
network	O
traffic	O
requests	O
.	O
</s>
<s>
While	O
a	O
primary	O
driver	O
for	O
DNS	B-Protocol
Analytics	I-Protocol
is	O
security	O
described	O
below	O
,	O
another	O
motivation	O
is	O
understanding	O
the	O
traffic	O
of	O
a	O
network	O
so	O
that	O
it	O
can	O
be	O
evaluated	O
for	O
improvements	O
or	O
optimization	O
.	O
</s>
<s>
For	O
example	O
,	O
DNS	B-Protocol
Analytics	I-Protocol
can	O
be	O
used	O
to	O
gather	O
data	O
on	O
a	O
lab	O
where	O
a	O
large	O
number	O
of	O
related	O
requests	O
for	O
PC	O
software	O
updates	O
are	O
made	O
.	O
</s>
<s>
Research	O
within	O
the	O
public	O
domain	O
shows	O
that	O
state-sponsored	O
malware	O
and	O
APT	O
campaigns	O
exhibit	O
DNS	B-Protocol
indicators	O
of	O
compromise	O
(	O
IOC	O
)	O
.	O
</s>
<s>
These	O
malware	O
and	O
APT	O
campaigns	O
can	O
be	O
reliably	O
identified	O
within	O
computer	B-Architecture
networks	I-Architecture
through	O
the	O
use	O
of	O
DNS	B-Protocol
analytics	I-Protocol
tools	O
.	O
</s>
