DNS Amplification Attacks
Obsolete or Potent Threats?
DOI:
https://doi.org/10.58445/rars.1484Keywords:
cybersecurity, DNS Amplification, AI, detectionAbstract
DNS Amplification attacks are a specific flavor of cybersecurity attack. These exploit the current implementation of the internet architecture. DNS amplification attacks allow for bad actors to take down the servers of a victim by overloading them with network traffic. My research intends to analyze the DNS amplification attack and see whether they are still something to be actively looked at as a dangerous threat to high profile targets. This will be done by looking into the history of DNS amplification attacks, seeing how the attack works from a network perspective, looking at real world utilizations of the attack, approaches to detection, and possible ways the attack may be modified in the future with improvements in AI.
References
Alavizadeh, H., Jang-Jaccard, J., Alpcan, T., & Camtepe, S. A. (2021). A Game-Theoretic
Approach for AI-based Botnet Attack Defence. arXiv [Id=’cs.CR’ Full_name=’Cryptography and Security’ is_active=True alt_name=None In_archive=’cs’ is_general=False Description=’Covers All Areas of Cryptography and Security Including Authentication, Public Key Cryptosytems, Proof-Carrying Code, Etc. Roughly Includes Material in ACM Subject Classes D.4.6 and E.3.’]. Retrieved from http://arxiv.org/abs/2112.02223
Anagnostopoulos, M., Kambourakis, G., Kopanos, P., Louloudakis, G., & Gritzalis, S. (2013).
DNS amplification attack revisited. Computers & Security, 39, 475–485. doi:10.1016/j.cose.2013.10.001
Bhardwaj, A., Mangat, V., Vig, R., Halder, S., & Conti, M. (2021). Distributed denial of service
attacks in cloud: State-of-the-art of scientific and commercial solutions. Computer Science Review, 39, 100332. doi:10.1016/j.cosrev.2020.100332
Cloudflare. (2011). A diagram showing Unicast and Anycast functionality. In A Brief Primer on
Anycast
Corera, G. (2015, July 10). UK teenager sentenced over “biggest” web attack. BBC News. https://www.bbc.com/news/technology-33480257
DDoS | second arrest in response to DDoS attack on Spamhaus. (2014, July 7). The Spamhaus Project. https://www.spamhaus.org/resource-hub/ddos/second-arrest-in-response-to-ddos-attack-on-spamhaus/
DNSBL | Update for Composite Blocklist (CBL) Users | Spamhaus. (2020, December 18). The Spamhaus Project. https://www.spamhaus.org/resource-hub/dnsbl/update-for-composite-blocklist-cbl-users/
Doan, T. V., Tsareva, I., & Bajpai, V. (2021). Measuring DNS over TLS from the Edge:
Adoption, Reliability, and Response Times. In O. Hohlfeld, A. Lutu, & D. Levin (Eds.), Passive and Active Measurement (pp. 192–209). Cham: Springer International Publishing.
Gupta, V., & Sharma, E. (09 2018). Mitigating DNS Amplification Attacks Using a Set of
Geographically Distributed SDN Routers. 392–400. doi:10.1109/ICACCI.2018.8554459
Handord, S. (2013, March 28). Chronology of a DDoS: SpamHaus. Cisco Blogs. https://blogs.cisco.com/security/chronology-of-a-ddos-spamhaus
Jin, C., & Wang, H. (11 2003). Hop-Count Filtering: An Effective Defense Against Spoofed
DDoS Traffic. doi:10.1145/948109.948116
Kambourakis, G., Moschos, T., Geneiatakis, D., & Gritzalis, S. (2008). Detecting DNS
Amplification Attacks. In J. Lopez & B. M. Hämmerli (Eds.), Critical Information Infrastructures Security (pp. 185–196). Berlin, Heidelberg: Springer Berlin Heidelberg.
Kottler, S. (2018, March 1). February 28th DDoS incident report. The GitHub Blog.
https://github.blog/news-insights/company-news/ddos-incident-report/
Krebs, B. (2013). Inside “The Attack That Almost Broke the Internet” — Krebs on Security. Krebsonsecurity.com. https://krebsonsecurity.com/2016/08/inside-the-attack-that-almost-broke-the-internet/
Lei, C., Zhang, H.-Q., Tan, J.-L., Zhang, Y.-C., & Liu, X.-H. (2018). Moving Target Defense Techniques: A Survey. Security and Communication Networks, 2018, 1–25. https://doi.org/10.1155/2018/3759626
Lu, C., Liu, B., Li, Z., Hao, S., Duan, H., Zhang, M., … Wu, J. (2019). An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come? Proceedings of the Internet Measurement Conference, 22–35. Presented at the Amsterdam, Netherlands. doi:10.1145/3355369.3355580
Osterweil, E., Stavrou, A., & Zhang, L. (2019). 20 Years of DDoS: a Call to Action. arXiv
[Cs.NI]. Retrieved from http://arxiv.org/abs/1904.02739
Perlroth, N. (2013, April 26). Dutch man said to be held in powerful internet attack. The New York Times. https://www.nytimes.com/2013/04/27/technology/dutch-man-said-to-be-arrested-in-powerful-internet-attack.html
Postel, J. (2019). RFC 791, IP protocol, DARPA internet program protocol specification. Ietf.org. https://tools.ietf.org/html/rfc791
Prince, M. (2013, March 20). The DDoS That Knocked Spamhaus Offline (And How We Mitigated It). The Cloudflare Blog. https://blog.cloudflare.com/the-ddos-that-knocked-spamhaus-offline-and-ho
Prince, M. (2013, March 27). The DDoS That Almost Broke the Internet. The Cloudflare Blog. https://blog.cloudflare.com/the-ddos-that-almost-broke-the-internet
R. R. Brooks, L. Yu, I. Ozcelik, J. Oakley, & N. Tusing. (2022). Distributed Denial of Service
(DDoS): A History. IEEE Annals of the History of Computing, 44(2), 44–54. doi:10.1109/MAHC.2021.3072582
Ryba, F.J., Orlinski, M., Wählisch, M., Rossow, C., & Schmidt, T.C. (2015). Amplification
and DRDoS Attack Defense - A Survey and New Perspectives. ArXiv, abs/1505.07892.
van der Toorn, O., Müller, M., Dickinson, S., Hesselman, C., Sperotto, A., & van Rijswijk - [24] Deij, R. (2022). Addressing the challenges of modern DNS: a comprehensive tutorial.
Computer science review, 45, Article 100469. https://doi.org/10.1016/j.cosrev.2022.100469
The Continuing Denial of Service Threat Posed by DNS Recursion (v2.0). (2006).
https://cisa.gov/sites/default/files/publications/DNS-recursion033006.pdf
Zhang, Y., & Cheng, Y. (2019). An Amplification DDoS Attack Defence Mechanism using
Reinforcement Learning. 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), 634–639. doi:10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00145
Zhu, Z., Lu, G., Chen, Y., Fu, Z. J., Roberts, P., & Han, K. (2008). Botnet Research Survey.
32nd Annual IEEE International Computer Software and Applications Conference, 967–972. doi:10.1109/COMPSAC.2008.205
Downloads
Posted
Categories
License
Copyright (c) 2024 Mohit Kolli
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.