vDNS: Securing DNS from Amplification Attacks

被引:0
|
作者
Nesary, Mohammad Mashud [1 ]
Aydeger, Abdullah [1 ]
机构
[1] Southern Illinois Univ, Dept Comp Sci, Carbondale, IL 62901 USA
关键词
Software-defined networks; Network Function Virtualization; vDNS; DNS Amplification Attack;
D O I
10.1109/BLACKSEACOM54372.2022.9858278
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Emerging Network Function Virtualization (NFV) technology has brought tremendous transformation to how the networking equipment operates. Domain Name System (DNS) has been the de facto protocol and standard for address resolution on the Internet. In this work, we introduce DNS servers as a part of the NFV framework, where the functionality of DNS can be provided via the virtual DNS (i.e., vDNS) servers. We investigate potential threats against vDNS where the DNS server is either attacked or exploited. Then, we propose our detection and mitigation strategies against DNS Amplification Attacks and discuss the high potential of scalability and agility that vDNS would bring to the traditional DNS infrastructure.
引用
收藏
页码:102 / 106
页数:5
相关论文
共 50 条
  • [41] Stopping DNS Rebinding Attacks in the Browser
    Hazhirpasand, Mohammadreza
    Ebrahim, Arash Ale
    Nierstrasz, Oscar
    [J]. ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 596 - 603
  • [42] Protecting the DNS from Routing Attacks Two Alternative Anycast Implementations
    Avramopoulos, Ioannis
    Suchara, Martin
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (05) : 14 - 20
  • [43] Securing Web Access-DNS Threats and Remedies
    Sehgal, Anchal
    Dixit, Abhishek
    [J]. EMERGING TRENDS IN EXPERT APPLICATIONS AND SECURITY, 2019, 841 : 337 - 345
  • [44] Detecting DNS Reflection Amplification DDoS Attack Originating from the Cloud
    Soliman, Ahmed K.
    Salama, Cherif
    Mohamed, Hoda K.
    [J]. PROCEEDINGS OF 2018 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES), 2018, : 145 - 150
  • [45] Secure DNS from amplification attack by using Modified Bloom Filters
    UzmaSattar
    Naqash, Talha
    Zafar, Muhammad Raheel
    Razzaq, Kashif
    bin Ubaid, Faisal
    [J]. 2013 EIGHTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT (ICDIM), 2013, : 20 - 23
  • [46] Securing Schools against Terrorist Attacks
    Hoskova-Mayerova, Sarka
    Bekesiene, Svajone
    Benova, Petra
    [J]. SAFETY, 2021, 7 (01)
  • [47] Securing Websites Against Homograph Attacks
    Abawajy, Jemal
    Richard, A.
    Al Aghbari, Zaher
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 239 : 47 - 59
  • [48] Securing smart vehicles from relay attacks using machine learning
    Ahmad, Usman
    Song, Hong
    Bilal, Awais
    Alazab, Mamoun
    Jolfaei, Alireza
    [J]. JOURNAL OF SUPERCOMPUTING, 2020, 76 (04): : 2665 - 2682
  • [49] Techniques for Securing 5G Network Services from attacks
    Varadharajan, Vijay
    Tupakula, Uday
    Karmakar, Kallol Krishna
    [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 273 - 280
  • [50] Specification-based IDS for securing RPL from topology attacks
    Le, Anhtuan
    Loo, Jonathan
    Luo, Yuan
    Lasebae, Aboubaker
    [J]. 2011 IFIP WIRELESS DAYS (WD), 2011,