[PDF][PDF] TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets

X Li, W Xu, B Liu, M Zhang, Z Li, J Zhang… - … IEEE Symposium on …, 2024 - jianjunchen.com
DNS can be compared to a game of chess in that its rules are simple, yet the possibilities it
presents are endless. While the fundamental rules of DNS are straightforward, DNS …

TsuKing: Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers

W Xu, X Li, C Lu, B Liu, H Duan, J Zhang… - Proceedings of the …, 2023 - dl.acm.org
In this paper, we present a new DNS amplification attack, named TsuKing. Instead of
exploiting individual DNS resolvers independently to achieve an amplification effect …

[HTML][HTML] Large-scale empirical evaluation of DNS and SSDP amplification attacks

M Anagnostopoulos, S Lagos… - Journal of Information …, 2022 - Elsevier
Reflection-based volumetric distributed denial-of-service (DDoS) attacks take advantage of
the available to all (open) services to flood and possibly overpower a victim's server or …

SDN-based detection and mitigation system for DNS amplification attacks

K Özdinçer, HA Mantar - 2019 3rd International Symposium on …, 2019 - ieeexplore.ieee.org
DNS amplification is a type of reflection-based DDoS attacks, and they are very hazardous
for the reliability of victims within the network. To prevent or mitigate such attacks, a …

Enterprise dns asset mapping and cyber-health tracking via passive traffic analysis

M Lyu, HH Gharakheili, C Russell… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The Domain Name System (DNS) is a critical service that enables domain names to be
converted to IP addresses (or vice versa); consequently, it is generally permitted through …

Detecting anomalies at a TLD name server based on DNS traffic predictions

D Madariaga, J Madariaga, M Panza… - … on Network and …, 2021 - ieeexplore.ieee.org
The Domain Name System (DNS) is a critical component of Internet infrastructure, as almost
every activity on the Internet starts with a DNS query. Given its importance, there is …

Amplification DoS Attacks

M Anagnostopoulos - Encyclopedia of cryptography, security and privacy, 2020 - Springer
The aim of an amplification DoS attack is to saturate the bandwidth of the victim with
numerous and large in size packets. It targets mainly the network layer of TCP/IP protocol …

Analyzing enterprise dns traffic to classify assets and track cyber-health

M Lyu, HH Gharakheili, C Russell… - arXiv preprint arXiv …, 2022 - arxiv.org
The Domain Name System (DNS) is a critical service that enables domain names to be
converted to IP addresses (or vice versa); consequently, it is generally permitted through …

A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries

A Bjerre, AP Westh, E Villefrance… - Nordic Conference on …, 2022 - Springer
Abstract Distributed Reflective Denial of Service (DRDoS) attacks exploit Internet facing
devices with the purpose to involve them in DoS incidents. In turn, these devices unwittingly …

[PDF][PDF] JRC TECHNICAL REPORT

V Kouliaridis, G Karopoulos, R Spigolon, I Sanchez - 2023 - publications.jrc.ec.europa.eu
Ensuring the interoperability and security of email communications is one of the
cornerstones of a resilient and 30 open Internet. In this context, the wide adoption of key …