Preprint / Version 1

DNS Amplification Attacks

Obsolete or Potent Threats?

##article.authors##

  • Mohit Kolli Dougherty Valley High School

DOI:

https://doi.org/10.58445/rars.1484

Keywords:

cybersecurity, DNS Amplification, AI, detection

Abstract

DNS Amplification attacks are a specific flavor of cybersecurity attack. These exploit the current implementation of the internet architecture. DNS amplification attacks allow for bad actors to take down the servers of a victim by overloading them with network traffic. My research intends to analyze the DNS amplification attack and see whether they are still something to be actively looked at as a dangerous threat to high profile targets. This will be done by looking into the history of DNS amplification attacks, seeing how the attack works from a network perspective, looking at real world utilizations of the attack, approaches to detection, and possible ways the attack may be modified in the future with improvements in AI.

References

Alavizadeh, H., Jang-Jaccard, J., Alpcan, T., & Camtepe, S. A. (2021). A Game-Theoretic

Approach for AI-based Botnet Attack Defence. arXiv [Id=’cs.CR’ Full_name=’Cryptography and Security’ is_active=True alt_name=None In_archive=’cs’ is_general=False Description=’Covers All Areas of Cryptography and Security Including Authentication, Public Key Cryptosytems, Proof-Carrying Code, Etc. Roughly Includes Material in ACM Subject Classes D.4.6 and E.3.’]. Retrieved from http://arxiv.org/abs/2112.02223

Anagnostopoulos, M., Kambourakis, G., Kopanos, P., Louloudakis, G., & Gritzalis, S. (2013).

DNS amplification attack revisited. Computers & Security, 39, 475–485. doi:10.1016/j.cose.2013.10.001

Bhardwaj, A., Mangat, V., Vig, R., Halder, S., & Conti, M. (2021). Distributed denial of service

attacks in cloud: State-of-the-art of scientific and commercial solutions. Computer Science Review, 39, 100332. doi:10.1016/j.cosrev.2020.100332

Cloudflare. (2011). A diagram showing Unicast and Anycast functionality. In A Brief Primer on

Anycast

Corera, G. (2015, July 10). UK teenager sentenced over “biggest” web attack. BBC News. https://www.bbc.com/news/technology-33480257

DDoS | second arrest in response to DDoS attack on Spamhaus. (2014, July 7). The Spamhaus Project. https://www.spamhaus.org/resource-hub/ddos/second-arrest-in-response-to-ddos-attack-on-spamhaus/

DNSBL | Update for Composite Blocklist (CBL) Users | Spamhaus. (2020, December 18). The Spamhaus Project. https://www.spamhaus.org/resource-hub/dnsbl/update-for-composite-blocklist-cbl-users/

Doan, T. V., Tsareva, I., & Bajpai, V. (2021). Measuring DNS over TLS from the Edge:

Adoption, Reliability, and Response Times. In O. Hohlfeld, A. Lutu, & D. Levin (Eds.), Passive and Active Measurement (pp. 192–209). Cham: Springer International Publishing.

Gupta, V., & Sharma, E. (09 2018). Mitigating DNS Amplification Attacks Using a Set of

Geographically Distributed SDN Routers. 392–400. doi:10.1109/ICACCI.2018.8554459

Handord, S. (2013, March 28). Chronology of a DDoS: SpamHaus. Cisco Blogs. https://blogs.cisco.com/security/chronology-of-a-ddos-spamhaus

Jin, C., & Wang, H. (11 2003). Hop-Count Filtering: An Effective Defense Against Spoofed

DDoS Traffic. doi:10.1145/948109.948116

Kambourakis, G., Moschos, T., Geneiatakis, D., & Gritzalis, S. (2008). Detecting DNS

Amplification Attacks. In J. Lopez & B. M. Hämmerli (Eds.), Critical Information Infrastructures Security (pp. 185–196). Berlin, Heidelberg: Springer Berlin Heidelberg.

Kottler, S. (2018, March 1). February 28th DDoS incident report. The GitHub Blog.

https://github.blog/news-insights/company-news/ddos-incident-report/

Krebs, B. (2013). Inside “The Attack That Almost Broke the Internet” — Krebs on Security. Krebsonsecurity.com. https://krebsonsecurity.com/2016/08/inside-the-attack-that-almost-broke-the-internet/

Lei, C., Zhang, H.-Q., Tan, J.-L., Zhang, Y.-C., & Liu, X.-H. (2018). Moving Target Defense Techniques: A Survey. Security and Communication Networks, 2018, 1–25. https://doi.org/10.1155/2018/3759626

Lu, C., Liu, B., Li, Z., Hao, S., Duan, H., Zhang, M., … Wu, J. (2019). An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come? Proceedings of the Internet Measurement Conference, 22–35. Presented at the Amsterdam, Netherlands. doi:10.1145/3355369.3355580

Osterweil, E., Stavrou, A., & Zhang, L. (2019). 20 Years of DDoS: a Call to Action. arXiv

[Cs.NI]. Retrieved from http://arxiv.org/abs/1904.02739

Perlroth, N. (2013, April 26). Dutch man said to be held in powerful internet attack. The New York Times. https://www.nytimes.com/2013/04/27/technology/dutch-man-said-to-be-arrested-in-powerful-internet-attack.html

Postel, J. (2019). RFC 791, IP protocol, DARPA internet program protocol specification. Ietf.org. https://tools.ietf.org/html/rfc791

Prince, M. (2013, March 20). The DDoS That Knocked Spamhaus Offline (And How We Mitigated It). The Cloudflare Blog. https://blog.cloudflare.com/the-ddos-that-knocked-spamhaus-offline-and-ho

Prince, M. (2013, March 27). The DDoS That Almost Broke the Internet. The Cloudflare Blog. https://blog.cloudflare.com/the-ddos-that-almost-broke-the-internet

R. R. Brooks, L. Yu, I. Ozcelik, J. Oakley, & N. Tusing. (2022). Distributed Denial of Service

(DDoS): A History. IEEE Annals of the History of Computing, 44(2), 44–54. doi:10.1109/MAHC.2021.3072582

Ryba, F.J., Orlinski, M., Wählisch, M., Rossow, C., & Schmidt, T.C. (2015). Amplification

and DRDoS Attack Defense - A Survey and New Perspectives. ArXiv, abs/1505.07892.

van der Toorn, O., Müller, M., Dickinson, S., Hesselman, C., Sperotto, A., & van Rijswijk - [24] Deij, R. (2022). Addressing the challenges of modern DNS: a comprehensive tutorial.

Computer science review, 45, Article 100469. https://doi.org/10.1016/j.cosrev.2022.100469

The Continuing Denial of Service Threat Posed by DNS Recursion (v2.0). (2006).

https://cisa.gov/sites/default/files/publications/DNS-recursion033006.pdf

Zhang, Y., & Cheng, Y. (2019). An Amplification DDoS Attack Defence Mechanism using

Reinforcement Learning. 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), 634–639. doi:10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00145

Zhu, Z., Lu, G., Chen, Y., Fu, Z. J., Roberts, P., & Han, K. (2008). Botnet Research Survey.

32nd Annual IEEE International Computer Software and Applications Conference, 967–972. doi:10.1109/COMPSAC.2008.205

Downloads

Posted

2024-08-18