Routing loops as mega amplifiers for dns-based ddos attacks

Y Nosyk, M Korczyński, A Duda - International Conference on Passive and …, 2022 - Springer
DDoS attacks are one of the biggest threats to the modern Internet as their magnitude is
constantly increasing. They are highly effective because of the amplification and reflection …

A matter of degree: characterizing the amplification power of open DNS resolvers

R Yazdani, R van Rijswijk-Deij, M Jonker… - … Conference on Passive …, 2022 - Springer
Open DNS resolvers are widely misused to bring about reflection and amplification DDoS
attacks. Indiscriminate efforts to address the issue and take down all resolvers have not fully …

{CAMP}: Compositional Amplification Attacks against {DNS}

H Duan, M Bearzi, J Vieli, D Basin, A Perrig… - 33rd USENIX Security …, 2024 - usenix.org
While DNS is often exploited by reflective DoS attacks, it can also be weaponized as a
powerful amplifier to overload itself, as evidenced by a stream of recently discovered …

Anomaly-based filtering of application-layer DDoS against DNS authoritatives

J Bushart, C Rossow - 2023 IEEE 8th European Symposium on …, 2023 - ieeexplore.ieee.org
Authoritative DNS infrastructures are at the core of the Internet ecosystem. But how resilient
are typical authoritative DNS name servers against application-layer Denial-of-Service …

Glossy Mirrors: On the Role of Open Resolvers in Reflection and Amplification DDoS Attacks

R Yazdani, M Resing, A Sperotto - 2024 20th International …, 2024 - ieeexplore.ieee.org
Open DNS resolvers are infamous contributors to DDoS attacks. Characteristics of open
DNS resolvers have been studied in different aspects in the past. However, there is a gap in …

Unveiling the weak links: exploring DNS infrastructure vulnerabilities and fortifying defenses

Y Nosyk, O Hureau, S Fernandez… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
In the past decades, DNS has gradually risen into one of the most important systems on the
Internet. Malicious actors have long misused it in reflection and amplification DDoS attacks …

The age of DDoScovery: an empirical comparison of industry and academic DDoS assessments

R Hiesgen, M Nawrocki, M Barcellos, D Kopp… - Proceedings of the …, 2024 - dl.acm.org
Motivated by the impressive but diffuse scope of DDoS research and reporting, we
undertake a multistakeholder (joint industry-academic) analysis to seek convergence across …

Hazardous echoes: the dns resolvers that should be put on mute

R Yazdani, Y Nosyk, R Holz… - 2023 7th Network …, 2023 - ieeexplore.ieee.org
Connectionless networking protocols such as DNS continue to be widely misused for
Reflection & Amplification (R&A) DDoS attacks. Early efforts to address the main cause of …

A Scalable Recommendation System for Selective Retention of DDoS Traffic: Entropy-Based Network Traffic Analysis

B Bleijerveld - 2024 - essay.utwente.nl
This study aims to enhance data retention strategies in the context of DDoS attacks by
designing, implementing, and evaluating a novel scalable system. The system is developed …

Leveraging Security Data for a Quantitative Evaluation of Security Mitigation Strategies

G Di Tizio - 2023 - iris.unitn.it
Keeping users' and organizations' data secure is a challenging task. The situation is made
more complicated due to the ever-increasing complex dependencies among IT systems. In …