Proceedings of the 2014 Conference on Internet Measurement Conference 2014
DOI: 10.1145/2663716.2663731
|View full text |Cite
|
Sign up to set email alerts
|

DNSSEC and its potential for DDoS attacks

Abstract: Over the past five years we have witnessed the introduction of DNSSEC, a security extension to the DNS that relies on digital signatures. DNSSEC strengthens DNS by preventing attacks such as cache poisoning. However, a common argument against the deployment of DNSSEC is its potential for abuse in Distributed Denial of Service (DDoS) attacks, in particular reflection and amplification attacks. DNS responses for a DNSSEC-signed domain are typically larger than those for an unsigned domain, thus, it may seem that… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
70
0
1

Year Published

2015
2015
2020
2020

Publication Types

Select...
7
2

Relationship

4
5

Authors

Journals

citations
Cited by 88 publications
(72 citation statements)
references
References 19 publications
1
70
0
1
Order By: Relevance
“…First, DNSSEC responses are larger and suffer more from IP fragmentation, which impacts availability [1]. Second, DNSSEC's larger responses can be abused for potent denial-of-service attacks [2]. Third, key management in DNSSEC is often complex, which may lead to mistakes that make domains unreachable.…”
Section: Introductionmentioning
confidence: 99%
“…First, DNSSEC responses are larger and suffer more from IP fragmentation, which impacts availability [1]. Second, DNSSEC's larger responses can be abused for potent denial-of-service attacks [2]. Third, key management in DNSSEC is often complex, which may lead to mistakes that make domains unreachable.…”
Section: Introductionmentioning
confidence: 99%
“…r 3 ) operated by SURFnet. 3 We performed a live capture of traffic 2 See http://www.internetsociety.org/deploy360/dnssec/statistics/ 3 The National Research and Education Network in the Netherlands. from clients to these DNS resolvers and replayed this traffic against an instrumented DNS resolver.…”
Section: B Modelmentioning
confidence: 99%
“…Because DNS is susceptible to IP address spoofing, it can be abused in so-called amplification attacks. For 'classic' DNS the average amplification factor is around 6×, but DNSSEC makes things much worse, increasing the average amplification to around 50× [2]. This means that by sending 100 Mbit/s, attackers can mount an attack of 5 Gbit/s.…”
mentioning
confidence: 99%
“…Alternatively, amplification can also be achieved by using standard authoritative DNS servers; there are hundreds of millions of such servers that allow amplification with a factors between 6 and 12. Particularly interesting may be the 3.5 million DNSSEC servers, which include digital signatures in their responses and therefore allow much higher amplification factors; factors between 40 and 55 should be realistic [4]. In addition to DNS systems, attackers can also use open NTP (4 million), open SNMP (8 million) or other servers to amplify attacks [5] [6].…”
Section: How To Make Ddos Attacks More Powerfulmentioning
confidence: 99%