A behavior-based method for detecting DNS amplification attacks

Longzhu Cai, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

DNS (Domain Name System) amplification attack has become a popular form of the attacks of the Distributed Denial of Service (DDoS) in recent years. In DNS amplification attacks, the attackers utilize spoofed source IP addresses and open recursive DNS servers to perform the bandwidth consumption attacks. A lot of responses are generated and they are sent to the targets after the attackers send only a little of DNS requests. Various methods have been proposed for detecting the DNS amplification attacks. However, almost of them have to determine parameters in advance, which is not easy for many cases. In this study, we utilized the detection pattern and combination of three features to distinguish normal and attack. It can solve the problem that limitation of detection in the case of high-frequency and low-amplification attack.

Original languageEnglish
Title of host publicationProceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016
EditorsFatos Xhafa, Leonard Barolli, Noriki Uchida
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages608-613
Number of pages6
ISBN (Electronic)9781509009848
DOIs
Publication statusPublished - Dec 21 2016
Event10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016 - Fukuoka, Japan
Duration: Jul 6 2016Jul 8 2016

Publication series

NameProceedings - 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016

Other

Other10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2016
Country/TerritoryJapan
CityFukuoka
Period7/6/167/8/16

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'A behavior-based method for detecting DNS amplification attacks'. Together they form a unique fingerprint.

Cite this