Effective amplification mitigation and spoofing detection during DNS flooding attacks on internet
Recent flooding attacks using Domain Name System (DNS) is used by cybercriminals to launch hundreds of gigabytes of attack traffic to paralyze their victims. The lack of security features in DNS protocol and adding security layers to this protocol is subject of further studying. In this reserach, we...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Medwell Journals
2017
|
Online Access: | http://psasir.upm.edu.my/id/eprint/61618/1/Effective%20amplification%20mitigation%20and%20spoofing%20detection%20during%20DNS%20flooding%20attacks%20on%20internet.pdf http://psasir.upm.edu.my/id/eprint/61618/ https://www.medwelljournals.com/abstract/?doi=jeasci.2017.475.480 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Recent flooding attacks using Domain Name System (DNS) is used by cybercriminals to launch hundreds of gigabytes of attack traffic to paralyze their victims. The lack of security features in DNS protocol and adding security layers to this protocol is subject of further studying. In this reserach, we proposed a distributed mechanism to counter DNS reflection based attacks with high detection accuracy and little overhead on network channels. We suggested Distributed Defense Scheme (DDS) to provide authenticity to DNS transactions (i.e. request and response) through authentication message exchange. Then our classification filtering plays an important role in distinguishing between real bogus DNS requests and discarding the fake requests. Our analysis shows how DDS can remarkably reduce amplification factor for attack traffic without affecting normal traffic flow. |
---|