首页> 外文会议>IFIP/IEEE International Symposium on Integrated Network Management >FQDN-Based Whitelist Filter on a DNS Cache Server Against the DNS Water Torture Attack
【24h】

FQDN-Based Whitelist Filter on a DNS Cache Server Against the DNS Water Torture Attack

机译:基于FQDN的白名单滤波器在DNS缓存服务器上进行DNS水酷刑攻击

获取原文

摘要

A distributed denial-of-service (DDoS) attack is a major social issue, such as the Domain Name System (DNS) DDoS attack against Dyn Inc., a DNS provider, which caused serious outages to several web services in 2016. This paper tackles the DNS water torture attack that was observed in the Dyn cyberattack. In the DNS water torture attack, attackers create a large number of unique and unresolvable fully qualified domain names (FQDNs) with random labels and send them to DNS cache servers and authoritative DNS servers, causing these servers to fail. Although countermeasures on DNS cache servers have been proposed to prevent such attack, one drawback of these countermeasures is that they cannot detect malicious DNS queries generated by an advanced DNS water torture attack. To address this shortcoming, we propose an FQDN-based whitelist filter that registers actually existing FQDNs and drops the non-existent ones created by the attackers. This whitelist filter eliminates malicious DNS queries while mitigating the negative impact of falsely dropping legitimate ones.
机译:分布式拒绝服务(DDOS)攻击是一个主要的社会问题,例如针对Dyn Inc.的域名系统(DNS)DDOS攻击,DNS提供商,这在2016年引起了几个Web服务的严重中断。本文在Dyn Cyber​​Actack中观察到的DNS水酷刑攻击。在DNS水酷刑攻击中,攻击者使用随机标签创建大量唯一和无法解析的完全限定域名(FQDN),并将其发送到DNS缓存服务器和权威DNS服务器,导致这些服务器失败。虽然已经提出了对DNS缓存服务器的对策以防止此类攻击,但这些对策的一个缺点是他们无法检测到先进的DNS水酷刑攻击产生的恶意DNS查询。为了解决此缺点,我们提出了一种基于FQDN的白名单筛选器,其寄存在实际现有的FQDNS中,并删除攻击者创建的不存在的文件。此白名单过滤器消除了恶意DNS查询,同时减轻了错误的丢弃合法的问题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号