首页> 外文会议>European symposium on research in computer security >Preventing DNS Amplification Attacks Using the History of DNS Queries with SDN
【24h】

Preventing DNS Amplification Attacks Using the History of DNS Queries with SDN

机译:使用SDN的DNS查询历史记录防止DNS放大攻击

获取原文

摘要

Domain Name System (DNS) amplification attack is a sophisticated Distributed Denial of Service (DDoS) attack by sending a huge volume of DNS name lookup requests to open DNS servers with the source address spoofed as a victim host. However, from the point of view of an individual network resource such as DNS server and switch, it is not easy to mitigate such attacks because a distributed attack could be performed with multiple DNS servers and/or switches. To overcome this limitation, we propose a novel security framework using Software-Defined Networking (SDN) to store the history of DNS queries as an evidence to distinguish normal DNS responses from attack packets. Our evaluation results demonstrate that the network traffic for DNS amplification attack can completely be blocked under various network conditions without incurring a significant communication overhead.
机译:域名系统(DNS)放大攻击是一种复杂的分布式拒绝服务(DDoS)攻击,它通过发送大量DNS名称查找请求来打开源地址被欺骗为受害主机的DNS服务器。但是,从单个网络资源(例如DNS服务器和交换机)的角度来看,减轻此类攻击并不容易,因为可以使用多个DNS服务器和/或交换机执行分布式攻击。为克服此限制,我们提出了一种使用软件定义网络(SDN)来存储DNS查询历史记录的新型安全框架,以作为区分正常DNS响应与攻击数据包的证据。我们的评估结果表明,在各种网络条件下,用于DNS放大攻击的网络流量都可以完全被阻止,而不会产生大量的通信开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号