Article ID Journal Published Year Pages File Type
4954825 Computer Networks 2017 10 Pages PDF
Abstract
DNS amplification has been instrumental in over 34% of high-volume network DDoS attacks, with some floods exceeding 300 Gbps. Today's best practices require Internet-wide cooperation and have been unable to prevent these attacks. In this work, we investigate whether these best practices can eliminate DNS amplification attacks and characterize what threats remain. In particular, we study roughly 130 million DNS domains and their associated servers to determine the DNS amplification potential associated with each. We find attackers can easily use these servers to create crippling floods and that few servers employ any protection measures to deter attackers.
Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, , ,