Large-scale empirical evaluation of DNS and SSDP amplification attacks

被引:6
|
作者
Anagnostopoulos, Marios [1 ]
Lagos, Stavros [2 ]
Kambourakis, Georgios [3 ]
机构
[1] Aalborg Univ, Dept Elect Syst, Aalborg, Denmark
[2] Univ Aegean, Dept Informat & Commun Syst Engn, Samos 83200, Greece
[3] Joint Res Ctr JRC, European Commiss, I-21027 Ispra, Italy
关键词
DDoS; DNS; SSDP; Network security; Internet measurement; Amplification attacks; Reflection attacks;
D O I
10.1016/j.jisa.2022.103168
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Reflection-based volumetric distributed denial-of-service (DDoS) attacks take advantage of the available to all(open) services to flood and possibly overpower a victim's server or network with an amplified amount oftraffic. This work concentrates on two key protocols in the assailants' quiver regarding DoS attacks, namelydomain name system (DNS) and simple service discovery protocol (SSDP). Our contribution spans three axes:(a) We perform countrywide IP address scans (probes) across three countries in two continents to locate devicesthat run open DNS or SSDP services, and thus can be effectively exploited in the context of amplificationattacks, (b) we fingerprint the discovered devices to derive information about their type and operating system,and (c) we estimate the amplification factor of the discovered reflectors through a dozen of diverse, suitablycrafted DNS queries and a couple of SSDP ones depending on the case. The conducted scans span fifteenmonths, therefore comparative conclusions regarding the evolution of the reflectors population over time, aswell as indirect ones regarding the security measures in this field, can be deduced. For instance, for DNS, it wascalculated that the third quartile of the amplification factor distribution remains more than 30 for customarilyexploited queries across all the examined countries, while in the worst case this figure can reach up to 70.The same figures for SSDP range between roughly 41 and 73 for a specific type of query. To our knowledge,this work offers the first full-fledged mapping and assessment of DNS and SSDP amplifiers, and it is thereforeanticipated to serve as a basis for further research in this ever-changing and high-stakes network security field
引用
收藏
页数:17
相关论文
共 50 条
  • [1] On the Effects of Large-Scale DNS Poisoning
    Barili, Antonio
    Lanterna, Dario
    [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 723 - 724
  • [2] Detecting DNS Amplification Attacks
    Kambourakis, Georgios
    Moschos, Tassos
    Geneiatakis, Dimitris
    Gritzalis, Stefanos
    [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY, 2008, 5141 : 185 - 196
  • [3] A fair solution to DNS amplification attacks
    Kambourakis, Georgios
    Moschos, Tassos
    Geneiatakis, Dimitris
    Gritzalis, Stefanos
    [J]. SECOND INTERNATIONAL ANNUAL WORKSHOP ON DIGITAL FORENSICS AND INCIDENT ANALYSIS, PROCEEDINGS, 2007, : 38 - +
  • [4] Community detection in large-scale networks: a survey and empirical evaluation
    Harenberg, Steve
    Bello, Gonzalo
    Gjeltema, L.
    Ranshous, Stephen
    Harlalka, Jitendra
    Seay, Ramona
    Padmanabhan, Kanchana
    Samatova, Nagiza
    [J]. WILEY INTERDISCIPLINARY REVIEWS-COMPUTATIONAL STATISTICS, 2014, 6 (06): : 426 - 439
  • [5] Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
    Mao, Yuhao
    Fu, Chong
    Wang, Saizhuo
    Ji, Shouling
    Zhang, Xuhong
    Liu, Zhenguang
    Zhou, Jun
    Liu, Alex X.
    Beyah, Raheem
    Wang, Ting
    [J]. 43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 1423 - 1439
  • [6] LARGE-SCALE AMPLIFICATION OF PLASMID DNA
    ANDORN, N
    SHILOACH, J
    [J]. DNA-A JOURNAL OF MOLECULAR & CELLULAR BIOLOGY, 1986, 5 (01): : 91 - 91
  • [7] DNS Amplification & DNS Tunneling Attacks Simulation, Detection and Mitigation Approaches
    Sanjay
    Rajendran, Balaji
    Shetty, Pushparaj D.
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT-2020), 2020, : 230 - 236
  • [8] vDNS: Securing DNS from Amplification Attacks
    Nesary, Mohammad Mashud
    Aydeger, Abdullah
    [J]. 2022 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (BLACKSEACOM), 2022, : 102 - 106
  • [9] Preventing DNS Amplification Attacks Using the History of DNS Queries with SDN
    Kim, Soyoung
    Lee, Sora
    Cho, Geumhwan
    Ahmed, Muhammad Ejaz
    Jeong, Jaehoon
    Kim, Hyoungshick
    [J]. COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 : 135 - 152
  • [10] Tor Bridge Discovery: Extensive Analysis and Large-scale Empirical Evaluation
    Ling, Zhen
    Luo, Junzhou
    Yu, Wei
    Yang, Ming
    Fu, Xinwen
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (07) : 1887 - 1899