Skip to main content

DNS Flood Attack Mitigation Utilizing Hot-Lists and Stale Content Updates

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2019)

Abstract

Domain Name System (DNS) has become a target of the Distributed Denial of Service (DDoS) attacks. When a DNS is under a DDoS flood attack, all the domain information under that DNS becomes unreachable, eventually causing unavailability of those particular domain names. In this paper, we propose a method which includes periodic stale content update and maintains a list of most frequently queried domain names of different DNS servers. Our simulation results show that the our method can serve more than \(70\%\) of the total cache responses during a massive DNS Flood attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Mahjabin, T., Xiao, Y., Sun, G., Jiang, W.: A survey of distributed denial-of-service attack, prevention, andmitigation techniques. Int. J. Distrib. Sens. Netw. 13(12), 1–33 (2017)

    Article  Google Scholar 

  2. Zeifman, I., Margolius, D.: The long and short of TTL – understanding DNS redundancy and the Dyn DDoS attack. https://www.incapsula.com/blog/the-long-and-short-of-ttl-the-ddos-perspective.html. Accessed 18 June 2018

  3. Vlajic, N., Andrade, M., Nguyen, U.T.: The role of DNS TTL values in potential DDoS attacks: what do the major banks know about it? Procedia Comput. Sci. 10, 466–473 (2012)

    Article  Google Scholar 

  4. Mahjabin, T., Xiao, Y.: Mitigation process for DNS flood attacks. In: Proceeding of 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas (Short Paper), 11–14 January 2019

    Google Scholar 

  5. Shang, H., Wills, C.E.: Piggybacking related domain names to improve DNS performance. Comput. Netw. 50(11), 1733–1748 (2006)

    Article  Google Scholar 

  6. Chen, H., Xiao, Y.: Cache access and replacement for future wireless internet. IEEE Commun. Mag. 44, 113–123 (2006)

    Article  Google Scholar 

  7. Xiao, Y., Chen, H.: Optimal callback with two-level adaptation for wireless data access. IEEE Trans. Mob. Comput. 5(8), 1087–1102 (2006)

    Article  Google Scholar 

  8. Wei-min, L., Lu-ying, C., Zhen-ming, L.: Alleviating the impact of DNS DDoS attacks. In: Second International Conference on Networks Security, Wireless Communications and Trusted Computing, vol. 1, pp. 240–243. IEEE, April 2010

    Google Scholar 

  9. Ballani, H., Francis, P.: Mitigating DNS DoS attacks. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 189–198. ACM, October 2008

    Google Scholar 

  10. Jung, J., Sit, E., Balakrishnan, H., Morris, R.: DNS performance and the effectiveness of caching. IEEE/ACM Trans. Networking 10(5), 589–603 (2002)

    Article  Google Scholar 

  11. Cohen, E., Kaplan, H.: Proactive caching of DNS records: addressing a performance bottleneck. Comput. Netw. 41(6), 707–726 (2003)

    Article  Google Scholar 

  12. Cao, P., Irani, S.: Cost-aware WWW proxy caching algorithms. In: USENIX Symposium on Internet Technologies and Systems, vol. 12, no. 97, pp. 193–206 (1997)

    Google Scholar 

  13. Jang, B., Lee, D., Chon, K., Kim, H.: DNS resolution with renewal using piggyback. J. Commun. Netw. 11(4), 416–427 (2009)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yang Xiao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mahjabin, T., Xiao, Y. (2019). DNS Flood Attack Mitigation Utilizing Hot-Lists and Stale Content Updates. In: Wang, G., Feng, J., Bhuiyan, M., Lu, R. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2019. Lecture Notes in Computer Science(), vol 11611. Springer, Cham. https://doi.org/10.1007/978-3-030-24907-6_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24907-6_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24906-9

  • Online ISBN: 978-3-030-24907-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics