首页> 美国卫生研究院文献>Sensors (Basel Switzerland) >Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers
【2h】

Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers

机译:挖掘IP与域名的交互以检测递归DNS服务器上的DNS泛洪攻击

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

The Domain Name System (DNS) is a critical infrastructure of any network, and, not surprisingly a common target of cybercrime. There are numerous works that analyse higher level DNS traffic to detect anomalies in the DNS or any other network service. By contrast, few efforts have been made to study and protect the recursive DNS level. In this paper, we introduce a novel abstraction of the recursive DNS traffic to detect a flooding attack, a kind of Distributed Denial of Service (DDoS). The crux of our abstraction lies on a simple observation: Recursive DNS queries, from IP addresses to domain names, form social groups; hence, a DDoS attack should result in drastic changes on DNS social structure. We have built an anomaly-based detection mechanism, which, given a time window of DNS usage, makes use of features that attempt to capture the DNS social structure, including a heuristic that estimates group composition. Our detection mechanism has been successfully validated (in a simulated and controlled setting) and with it the suitability of our abstraction to detect flooding attacks. To the best of our knowledge, this is the first time that work is successful in using this abstraction to detect these kinds of attacks at the recursive level. Before concluding the paper, we motivate further research directions considering this new abstraction, so we have designed and tested two additional experiments which exhibit promising results to detect other types of anomalies in recursive DNS servers.
机译:域名系统(DNS)是任何网络的关键基础架构,不足为奇的是网络犯罪的共同目标。有许多工作可以分析更高级别的DNS流量以检测DNS或任何其他网络服务中的异常。相比之下,很少有人努力研究和保护递归DNS级别。在本文中,我们介绍了一种新型的递归DNS流量抽象,以检测洪泛攻击,这是一种分布式拒绝服务(DDoS)。我们抽象的症结在于一个简单的观察:从IP地址到域名的递归DNS查询形成了社会群体;因此,DDoS攻击应导致DNS社会结构发生巨大变化。我们建立了一个基于异常的检测机制,该机制在给定DNS使用时间窗口的情况下,利用试图捕获DNS社会结构的功能,包括一种估计组组成的启发式方法。我们的检测机制已经成功验证(在模拟和受控的设置下),并且它具有适合抽象检测水浸攻击的能力。据我们所知,这是首次成功使用此抽象在递归级别检测此类攻击的工作。在结束本文之前,我们考虑这种新的抽象来激发进一步的研究方向,因此我们设计并测试了另外两个实验,这些实验显示出有希望的结果来检测递归DNS服务器中的其他类型的异常。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号