2012
DOI: 10.3837/tiis.2012.10.018
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Flooding DoS Attacks Utilizing DNS Name Error Queries

Abstract: The Domain Name System (DNS) is a critical Internet infrastructure that provides name to address mapping services. In the past decade, Denial-of-Service (DoS) attacks have targeted the DNS infrastructure and threaten to disrupt this critical service. While the flooding DoS attacks may be alleviated by the DNS caching mechanism, we show in this paper that flooding DoS attacks utilizing name error queries is capable of bypassing the cache of resolvers and thereby impose overwhelming flooding attacks on the name … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…There are many techniques available to detect and mitigate DoS attacks in IP‐address‐based communications. They include from simple monitoring of traffic anomalies to highly advanced solutions using artificial intelligence, per‐flow‐based traffic analysis, and many more . Their applicability in CCN paradigm is yet to be checked according to its routing mechanism.…”
Section: Discussion and Concluding Remarksmentioning
confidence: 99%
“…There are many techniques available to detect and mitigate DoS attacks in IP‐address‐based communications. They include from simple monitoring of traffic anomalies to highly advanced solutions using artificial intelligence, per‐flow‐based traffic analysis, and many more . Their applicability in CCN paradigm is yet to be checked according to its routing mechanism.…”
Section: Discussion and Concluding Remarksmentioning
confidence: 99%
“…Hence, by adopting ECS, the DNS cache will be expanded and complicated by a factor of the number of ECS scopes. The vulnerability may be exploited in DoS attacks, which aim at bypassing caching and flooding authoritative servers [ 37 , 38 ]. A DNS privacy study [ 32 ] pinpointed the limitation, which applies to any end-to-end DNS proposal.…”
Section: Remote Dns Problem and Solutionsmentioning
confidence: 99%
“…1) Randomizing query names: DNS caching mechanism searches for the item in cache that exactly matches the query name in question. So if query names may be sufficiently randomized, there is little chance of repeated query names within one TTL and thus the cache hit rate will be close to zero [26] (illustrated in the question in blue in Fig. 1).…”
Section: A Avoiding Cache Hitmentioning
confidence: 99%