Effective amplification mitigation and spoofing detection during DNS flooding attacks on internet

Recent flooding attacks using Domain Name System (DNS) is used by cybercriminals to launch hundreds of gigabytes of attack traffic to paralyze their victims. The lack of security features in DNS protocol and adding security layers to this protocol is subject of further studying. In this reserach, we...

Full description

Saved in:
Bibliographic Details
Main Authors: Hasan, Dana, Hussin, Masnida, Abdullah, Azizol
Format: Article
Language:English
Published: Medwell Journals 2017
Online Access:http://psasir.upm.edu.my/id/eprint/61618/1/Effective%20amplification%20mitigation%20and%20spoofing%20detection%20during%20DNS%20flooding%20attacks%20on%20internet.pdf
http://psasir.upm.edu.my/id/eprint/61618/
https://www.medwelljournals.com/abstract/?doi=jeasci.2017.475.480
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Recent flooding attacks using Domain Name System (DNS) is used by cybercriminals to launch hundreds of gigabytes of attack traffic to paralyze their victims. The lack of security features in DNS protocol and adding security layers to this protocol is subject of further studying. In this reserach, we proposed a distributed mechanism to counter DNS reflection based attacks with high detection accuracy and little overhead on network channels. We suggested Distributed Defense Scheme (DDS) to provide authenticity to DNS transactions (i.e. request and response) through authentication message exchange. Then our classification filtering plays an important role in distinguishing between real bogus DNS requests and discarding the fake requests. Our analysis shows how DDS can remarkably reduce amplification factor for attack traffic without affecting normal traffic flow.