2022
DOI: 10.1007/978-3-030-98785-5_28
|View full text |Cite
|
Sign up to set email alerts
|

Routing Loops as Mega Amplifiers for DNS-Based DDoS Attacks

Abstract: DDoS attacks are one of the biggest threats to the modern Internet as their magnitude is constantly increasing. They are highly effective because of the amplification and reflection potential of different Internet protocols. In this paper, we show how a single DNS query triggers a response packet flood to the query source, possibly because of middleboxes located in networks with routing loops. We send DNS A requests to 3 billion routable IPv4 hosts and find 15,909 query destinations from 1,742 autonomous syste… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 46 publications
0
1
0
Order By: Relevance
“…Instead, malicious URLs (and domain names) are blocked by web browsers (e.g., Chrome, Firefox) using Google Safe Browsing. The problem is raised by open (misconfigured) DNS servers that facilitate amplification reflection Distributed Denial-of-Service (DRDoS) attacks [47], [57], [66], [73], [75], [78]. Open DNS resolvers accept DNS requests from any end host, which can be misused to either target authoritative nameservers by sending an excessive number of incoming requests or, if combined with IP address spoofing, used to redirect responses to victim end-hosts.…”
Section: Motivationmentioning
confidence: 99%
“…Instead, malicious URLs (and domain names) are blocked by web browsers (e.g., Chrome, Firefox) using Google Safe Browsing. The problem is raised by open (misconfigured) DNS servers that facilitate amplification reflection Distributed Denial-of-Service (DRDoS) attacks [47], [57], [66], [73], [75], [78]. Open DNS resolvers accept DNS requests from any end host, which can be misused to either target authoritative nameservers by sending an excessive number of incoming requests or, if combined with IP address spoofing, used to redirect responses to victim end-hosts.…”
Section: Motivationmentioning
confidence: 99%
“…As a result, legitimate users cannot access network resources and services, or access will be very slow or intermittent. This type of attack consumes the victim's bandwidth by overloading via sending a large amount of traffic to this prey [1], [9]. The volumetric attack occurs when DNS focuses on exhausting the host's available bandwidth.…”
Section: A Volumetric Attacksmentioning
confidence: 99%