Proceedings of the 21st ACM Internet Measurement Conference 2021
DOI: 10.1145/3487552.3487835
|View full text |Cite
|
Sign up to set email alerts
|

The far side of DNS amplification

Abstract: In this paper, we shed new light on the DNS amplification ecosystem, by studying complementary data sources, bolstered by orthogonal methodologies. First, we introduce a passive attack detection method for the Internet core, i.e., at Internet eXchange Points (IXPs). Surprisingly, IXPs and honeypots observe mostly disjoint sets of attacks: 96% of IXP-inferred attacks were invisible to a sizable honeypot platform. Second, we assess the effectiveness of observed DNS attacks by studying IXP traces jointly with div… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 52 publications
1
10
0
Order By: Relevance
“…Reports of DDoS attacks in the news suggest that attackers increasingly use DNSSEC-signed domains in amplification attacks [14]. This is supported by observations using DDoS honeypots [23] as well as in a recent work that studies R&A attacks using IXP traces [31]. Whether or not an open resolver supports DNSSEC is thus a factor that influences its usability for amplification from an attacker's point of view.…”
Section: Support For Dns Protocol Featuresmentioning
confidence: 83%
See 1 more Smart Citation
“…Reports of DDoS attacks in the news suggest that attackers increasingly use DNSSEC-signed domains in amplification attacks [14]. This is supported by observations using DDoS honeypots [23] as well as in a recent work that studies R&A attacks using IXP traces [31]. Whether or not an open resolver supports DNSSEC is thus a factor that influences its usability for amplification from an attacker's point of view.…”
Section: Support For Dns Protocol Featuresmentioning
confidence: 83%
“…Nawrocki et al [31] studied the behavior of attackers in terms of which sets of open DNS resolvers they misuse in attacks. Their results show that attackers efficiently detect new resolvers and steadily rotate between them.…”
Section: Related Workmentioning
confidence: 99%
“…Recent research observes this for different honeypot deployments, which show very diverging event sets with incomplete pictures of attacks. Two independent studies show small overlaps of only 4% [23] and 8.18% [24] between UDP amplification attacks observed at common honeypots and different vantage points (i.e., other honeypot platforms and IXPs), challenging previous assumptions and claims of convergence. Furthermore, analyses based on the large HPI platform show that convergence differs by protocol and that a general approach to high attack visibility (i.e., 99%) is hard to achieve, e.g., RIP measurements require 60 sensors and other protocols ≈150 sensors [16].…”
Section: Current Methodsmentioning
confidence: 91%
“…They conclude that the CCC platform captures 85.1%-96.6% of all attacks [14]. Other work derives that 5 CCC sensors monitor > 99.5% of the DNS victims [23].…”
Section: Current Methodsmentioning
confidence: 96%
See 1 more Smart Citation