Fingerprinting internet DNS amplification DDoS activities

C Fachkha, E Bou-Harb… - 2014 6th International …, 2014 - ieeexplore.ieee.org
2014 6th International Conference on New Technologies, Mobility …, 2014ieeexplore.ieee.org
This work proposes a novel approach to infer and characterize Internet-scale DNS
amplification DDoS attacks by leveraging the darknet space. Complementary to the pioneer
work on inferring Distributed Denial of Service (DDoS) using darknet, this work shows that
we can extract DDoS activities without relying on backscattered analysis. The aim of this
work is to extract cyber security intelligence related to DNS Amplification DDoS activities
such as detection period, attack duration, intensity, packet size, rate and geo-location in …
This work proposes a novel approach to infer and characterize Internet-scale DNS amplification DDoS attacks by leveraging the darknet space. Complementary to the pioneer work on inferring Distributed Denial of Service (DDoS) using darknet, this work shows that we can extract DDoS activities without relying on backscattered analysis. The aim of this work is to extract cyber security intelligence related to DNS Amplification DDoS activities such as detection period, attack duration, intensity, packet size, rate and geo- location in addition to various network-layer and flow-based insights. To achieve this task, the proposed approach exploits certain DDoS parameters to detect the attacks. We empirically evaluate the proposed approach using 720 GB of real darknet data collected from a /13 address space during a recent three months period. Our analysis reveals that the approach was successful in inferring significant DNS amplification DDoS activities including the recent prominent attack that targeted one of the largest anti-spam organizations. Moreover, the analysis disclosed the mechanism of such DNS amplification DDoS attacks. Further, the results uncover high-speed and stealthy attempts that were never previously documented. The case study of the largest DDoS attack in history lead to a better understanding of the nature and scale of this threat and can generate inferences that could contribute in detecting, preventing, assessing, mitigating and even attributing of DNS amplification DDoS activities.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果