37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07) 2007
DOI: 10.1109/dsn.2007.42
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing DNS Resilience against Denial of Service Attacks

Abstract: The Domain Name System (DNS) is a critical Internet infrastructure that provides name to address mapping services. In the past few years, distributed denial of service (DDoS) attacks have targeted the DNS infrastructure and threaten to disrupt this critical service. In this paper we show that the existing DNS can gain significant resilience against DDoS attacks through a simple change to the current DNS operations, by setting longer time-to-live values for a special class of DNS resource records, the infrastru… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…6 Although the use of DNS caching and redundancy servers reduce the effect of DDoS, a number of such attacks have been successfully directed against root and top-level DNS servers in past years [108]- [110]. Many solutions have been presented in past years that either: (1) require some changes in the DNS protocol [111]- [114], or (2) propose new resolution services [115], [116]. Nowadays, DNS uses a single approach that does not require any modification to its architecture, which is the adoption of "Anycast" [117].…”
Section: G Availabilitymentioning
confidence: 99%
“…6 Although the use of DNS caching and redundancy servers reduce the effect of DDoS, a number of such attacks have been successfully directed against root and top-level DNS servers in past years [108]- [110]. Many solutions have been presented in past years that either: (1) require some changes in the DNS protocol [111]- [114], or (2) propose new resolution services [115], [116]. Nowadays, DNS uses a single approach that does not require any modification to its architecture, which is the adoption of "Anycast" [117].…”
Section: G Availabilitymentioning
confidence: 99%
“…If we use DNS to solve the mapping relation between EMD subdivision mesh code and the sever IP address, there will be some unreliable elements [11] [14] . When there is something wrong about the DNS server, the whole system will be destroyed [7] .…”
Section: A Securitymentioning
confidence: 99%
“…A review of the scientific and technical literature shows that no effective measures have been taken to handle false responses of DNS. Domain Name System Security Extensions (DNSSEC) are one of the methods to prevent falsification [6][7][8][9][10]. DNSSEC is the DNS protocol extension that minimises attacks in which DNS addresses change.…”
Section: Introductionmentioning
confidence: 99%