vDNS: Securing DNS from Amplification Attacks

被引:0
|
作者
Nesary, Mohammad Mashud [1 ]
Aydeger, Abdullah [1 ]
机构
[1] Southern Illinois Univ, Dept Comp Sci, Carbondale, IL 62901 USA
关键词
Software-defined networks; Network Function Virtualization; vDNS; DNS Amplification Attack;
D O I
10.1109/BLACKSEACOM54372.2022.9858278
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Emerging Network Function Virtualization (NFV) technology has brought tremendous transformation to how the networking equipment operates. Domain Name System (DNS) has been the de facto protocol and standard for address resolution on the Internet. In this work, we introduce DNS servers as a part of the NFV framework, where the functionality of DNS can be provided via the virtual DNS (i.e., vDNS) servers. We investigate potential threats against vDNS where the DNS server is either attacked or exploited. Then, we propose our detection and mitigation strategies against DNS Amplification Attacks and discuss the high potential of scalability and agility that vDNS would bring to the traditional DNS infrastructure.
引用
收藏
页码:102 / 106
页数:5
相关论文
共 50 条
  • [31] Towards Securing Cloud Computing from DDOS Attacks
    Ahmed, Ishtiaq
    Ahmed, Sheeraz
    Nawaz, Asif
    Jan, Sadeeq
    Najam, Zeeshan
    Saadat, Muneeb
    Khan, Rehan Ali
    Zaman, Khalid
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (08) : 615 - 622
  • [32] Towards Securing Medical Documents from Insider Attacks
    Bin Ahmad, Maaz
    Khan, Abdul Wahab
    Fahad, Muhammad
    Asif, Muhammad
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (08) : 357 - 360
  • [33] Why Bother Securing DNS? (Transcript of Discussion)
    Gollmann, Dieter
    [J]. SECURITY PROTOCOLS XXII, 2014, 8809 : 9 - 17
  • [34] Towards securing cloud computing from DDOS attacks
    Ahmed, Ishtiaq
    Ahmed, Sheeraz
    Nawaz, Asif
    Jan, Sadeeq
    Najam, Zeeshan
    Saadat, Muneeb
    Khan, Rehan Ali
    Zaman, Khalid
    [J]. International Journal of Advanced Computer Science and Applications, 2020, 11 (08): : 615 - 622
  • [35] DNS amplification attack revisited
    Anagnostopoulos, Marios
    Kambourakis, Georgios
    Kopanos, Panagiotis
    Louloudakis, Georgios
    Gritzalis, Stefanos
    [J]. COMPUTERS & SECURITY, 2013, 39 : 475 - 485
  • [36] Securing MAODV: Attacks and countermeasures
    Roy, S
    Addada, VG
    Setia, S
    Jajodia, S
    [J]. 2005 SECOND ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR AND AD HOC COMMUNICATIONS AND NETWORKS, 2005, : 521 - 532
  • [37] Reducing DNS Cache Poisoning Attacks
    Mohan, Jayashree
    Puranik, Shruthi
    Chandrasekaran, K.
    [J]. ICACCS 2015 PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS, 2015,
  • [38] An Overview of DDoS attacks based on DNS
    Alieyan, Kamal
    Kadhum, Mohammed M.
    Anbar, Mohammed
    Ul Rehman, Shafiq
    Alajmi, Naser K. A.
    [J]. 2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 276 - 280
  • [39] Mitigation Process for DNS Flood Attacks
    Mahjabin, Tasnuva
    Xiao, Yang
    [J]. 2019 16TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2019,
  • [40] Securing Docker Containers from Denial of Service (DoS) Attacks
    Chelladhurai, Jeeva
    Chelliah, Pethuru Raj
    Kumar, Sathish Alampalayam
    [J]. PROCEEDINGS 2016 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2016), 2016, : 856 - 859