首页> 外文会议>European Symposium on Research in Computer Security >Preventing DNS Amplification Attacks Using the History of DNS Queries with SDN
【24h】

Preventing DNS Amplification Attacks Using the History of DNS Queries with SDN

机译:防止DNS放大攻击使用DNS查询与SDN的历史

获取原文

摘要

Domain Name System (DNS) amplification attack is a sophisticated Distributed Denial of Service (DDoS) attack by sending a huge volume of DNS name lookup requests to open DNS servers with the source address spoofed as a victim host. However, from the point of view of an individual network resource such as DNS server and switch, it is not easy to mitigate such attacks because a distributed attack could be performed with multiple DNS servers and/or switches. To overcome this limitation, we propose a novel security framework using Software-Defined Networking (SDN) to store the history of DNS queries as an evidence to distinguish normal DNS responses from attack packets. Our evaluation results demonstrate that the network traffic for DNS amplification attack can completely be blocked under various network conditions without incurring a significant communication overhead.
机译:域名系统(DNS)放大攻击是一种复杂的分布式拒绝服务(DDOS)攻击,通过发送大量的DNS名称查找请求来打开DNS服务器,源地址被欺骗为受害者主机。然而,从诸如DNS服务器和交换机的个人网络资源的角度来看,不容易减轻这种攻击,因为可以用多个DNS服务器和/或交换机执行分布式攻击。为了克服这一限制,我们提出了一种使用软件定义的网络(SDN)来将DNS查询的历史提出了一种新的安全框架,作为区分来自攻击数据包的正常DNS响应的证据。我们的评估结果表明,DNS放大攻击的网络流量可以在各种网络条件下完全阻止,而不会产生显着的通信开销。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号