@inproceedings{03af9c171f8e46eaa71f47b669db7bb9,
title = "A behavior-based method for detecting DNS amplification attacks",
abstract = "DNS (Domain Name System) amplification attack has become a popular form of the attacks of the Distributed Denial of Service (DDoS) in recent years. In DNS amplification attacks, the attackers utilize spoofed source IP addresses and open recursive DNS servers to perform the bandwidth consumption attacks. A lot of responses are generated and they are sent to the targets after the attackers send only a little of DNS requests. Various methods have been proposed for detecting the DNS amplification attacks. However, almost of them have to determine parameters in advance, which is not easy for many cases. In this study, we utilized the detection pattern and combination of three features to distinguish normal and attack. It can solve the problem that limitation of detection in the case of high-frequency and low-amplification attack.",
author = "Longzhu Cai and Yaokai Feng and Junpei Kawamoto and Kouichi Sakurai",
year = "2016",
month = dec,
day = "21",
doi = "10.1109/IMIS.2016.88",
language = "English",
series = "Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "608--613",
editor = "Fatos Xhafa and Leonard Barolli and Noriki Uchida",
booktitle = "Proceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016",
address = "United States",
note = "10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016 ; Conference date: 06-07-2016 Through 08-07-2016",
}