| Article ID | Journal | Published Year | Pages | File Type |
|---|---|---|---|---|
| 4954825 | Computer Networks | 2017 | 10 Pages |
Abstract
DNS amplification has been instrumental in over 34% of high-volume network DDoS attacks, with some floods exceeding 300Â Gbps. Today's best practices require Internet-wide cooperation and have been unable to prevent these attacks. In this work, we investigate whether these best practices can eliminate DNS amplification attacks and characterize what threats remain. In particular, we study roughly 130 million DNS domains and their associated servers to determine the DNS amplification potential associated with each. We find attackers can easily use these servers to create crippling floods and that few servers employ any protection measures to deter attackers.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Douglas C. MacFarland, Craig A. Shue, Andrew J. Kalafut,
