首页> 外文会议>IEEE Conference on Network Softwarization >Leveraging on the XDP Framework for the Efficient Mitigation of Water Torture Attacks within Authoritative DNS Servers
【24h】

Leveraging on the XDP Framework for the Efficient Mitigation of Water Torture Attacks within Authoritative DNS Servers

机译:利用XDP框架有效缓解权威DNS服务器中的水刑攻击

获取原文

摘要

In this paper we utilize XDP for DNS Deep Packet Inspection (DPI) in order to mitigate Water Torture attacks at the NIC driver level of Authoritative DNS Servers. Our approach may benefit DNS Administrators who wish to filter attack traffic within their DNS infrastructure and avoid the latency overhead and additional costs imposed by external cloud scrubbing services. Our schema does not depend on specialized hardware and does not blacklist entire domain name suffices, hence does not block legitimate requests. Packets are intercepted by XDP that identifies messages of DNS requests for further processing. Requested names are extracted from the message payload and categorized based on their validity. Valid names are forwarded to the user space to be resolved, whilst invalid ones are dropped within the Linux kernel at an early stage without downgrading the DNS service. Names are classified using Bloom Filters that map DNS zone contents in a memory efficient manner. These probabilistic data structures are free of false negatives and therefore valid DNS requests are never dropped. We provide a proof of concept setup to test our schema under a DDoS attack scenario and assess how mitigation performance is affected by DPI on DNS requests. Our experiments verify that using XDP significantly increases the throughput of valid DNS responses compared to user space alternatives. In conclusion, XDP emerges as a promising solution for the mitigation of Water Torture attacks against DNS servers.
机译:在本文中,我们使用XDP进行DNS深度数据包检查(DPI),以减轻权威DNS服务器的NIC驱动程序级别的水刑攻击。我们的方法可能会使希望在其DNS基础结构中过滤攻击流量并避免延迟开销和外部云清理服务带来的额外费用的DNS管理员受益。我们的架构不依赖于专用硬件,并且不会将整个域名都列入黑名单,因此不会阻止合法请求。 XDP截获数据包,该数据包标识DNS请求的消息以进行进一步处理。从消息有效负载中提取请求的名称,并根据其有效性对其进行分类。有效名称会转发到要解析的用户空间,而无效名称会在不降低DNS服务降级的前提下尽早地放入Linux内核中。名称使用Bloom过滤器进行分类,Bloom过滤器以内存有效的方式映射DNS区域内容。这些概率数据结构没有误报,因此永远不会丢弃有效的DNS请求。我们提供了概念验证设置,以在DDoS攻击情形下测试我们的架构,并评估DPI对DNS请求的缓解性能如何产生影响。我们的实验证明,与用户空间替代方案相比,使用XDP可显着提高有效DNS响应的吞吐量。总之,XDP成为缓解DNS服务器遭受Water Torture攻击的有希望的解决方案。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号