Preventing DNS misuse for Reflection/Amplification attacks with minimal computational overhead on the Internet

DNS reflection/amplification attacks are types of Distributed Denial of Service (DDoS) attacks that take advantage of vulnerabilities in the Domain Name System (DNS) and use it as an attacking tool. This type of attack can quickly deplete the resources (i.e. computational and bandwidth) of the targe...

Full description

Saved in:
Bibliographic Details
Main Authors: Rebeen Rebwar Hama Amin, Dana Hassan, Masnida Hussin
Format: Article
Language:English
Published: Sulaimani Polytechnic University 2020-12-01
Series:Kurdistan Journal of Applied Research
Subjects:
Online Access:https://kjar.spu.edu.iq/index.php/kjar/article/view/559
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1823861345602240512
author Rebeen Rebwar Hama Amin
Dana Hassan
Masnida Hussin
author_facet Rebeen Rebwar Hama Amin
Dana Hassan
Masnida Hussin
author_sort Rebeen Rebwar Hama Amin
collection DOAJ
description DNS reflection/amplification attacks are types of Distributed Denial of Service (DDoS) attacks that take advantage of vulnerabilities in the Domain Name System (DNS) and use it as an attacking tool. This type of attack can quickly deplete the resources (i.e. computational and bandwidth) of the targeted system. Many defense mechanisms are proposed to mitigate the impact of this type of attack. However, these defense mechanisms are centralized-based and cannot deal with a distributed-based attack. Also, these defense mechanisms have a single point of deployment which leads to a lack of computational resources to handle an attack with a large magnitude. In this work, we presented a new distributed-based defense mechanism (DDM) to counter reflection/ amplification attacks. While operating, we calculated the CPU counters of the machines that we deployed our defense mechanism with which showed 19.9% computational improvement. On top of that, our defense mechanism showed that it can protect the attack path from exhaustion during reflection/amplification attacks without putting any significant traffic load on the network by eliminating every spoofed request from getting responses.
format Article
id doaj-art-7e269462c1fd400490463ac993e48813
institution Kabale University
issn 2411-7684
2411-7706
language English
publishDate 2020-12-01
publisher Sulaimani Polytechnic University
record_format Article
series Kurdistan Journal of Applied Research
spelling doaj-art-7e269462c1fd400490463ac993e488132025-02-09T21:00:05ZengSulaimani Polytechnic UniversityKurdistan Journal of Applied Research2411-76842411-77062020-12-015210.24017/science.2020.2.6Preventing DNS misuse for Reflection/Amplification attacks with minimal computational overhead on the InternetRebeen Rebwar Hama Amin0https://orcid.org/0000-0002-9847-5543Dana Hassan1https://orcid.org/0000-0002-7664-799XMasnida Hussin2Network Department, Computer Science Institute, Sulaimani Polytechnic University, Sulaimani, IraqComputer Science Department, College of Science, University of Garmian, Sulaimani, IraqDepartment of Communication Technology and Network,Faculty of Computer Science and Information Technology, Universiti Putra Malaysia , Serdang, Selangor, MalaysiaDNS reflection/amplification attacks are types of Distributed Denial of Service (DDoS) attacks that take advantage of vulnerabilities in the Domain Name System (DNS) and use it as an attacking tool. This type of attack can quickly deplete the resources (i.e. computational and bandwidth) of the targeted system. Many defense mechanisms are proposed to mitigate the impact of this type of attack. However, these defense mechanisms are centralized-based and cannot deal with a distributed-based attack. Also, these defense mechanisms have a single point of deployment which leads to a lack of computational resources to handle an attack with a large magnitude. In this work, we presented a new distributed-based defense mechanism (DDM) to counter reflection/ amplification attacks. While operating, we calculated the CPU counters of the machines that we deployed our defense mechanism with which showed 19.9% computational improvement. On top of that, our defense mechanism showed that it can protect the attack path from exhaustion during reflection/amplification attacks without putting any significant traffic load on the network by eliminating every spoofed request from getting responses. https://kjar.spu.edu.iq/index.php/kjar/article/view/559DNS, DDM, Reflection/amplification, DDoS, Amplification Factor.
spellingShingle Rebeen Rebwar Hama Amin
Dana Hassan
Masnida Hussin
Preventing DNS misuse for Reflection/Amplification attacks with minimal computational overhead on the Internet
Kurdistan Journal of Applied Research
DNS, DDM, Reflection/amplification, DDoS, Amplification Factor.
title Preventing DNS misuse for Reflection/Amplification attacks with minimal computational overhead on the Internet
title_full Preventing DNS misuse for Reflection/Amplification attacks with minimal computational overhead on the Internet
title_fullStr Preventing DNS misuse for Reflection/Amplification attacks with minimal computational overhead on the Internet
title_full_unstemmed Preventing DNS misuse for Reflection/Amplification attacks with minimal computational overhead on the Internet
title_short Preventing DNS misuse for Reflection/Amplification attacks with minimal computational overhead on the Internet
title_sort preventing dns misuse for reflection amplification attacks with minimal computational overhead on the internet
topic DNS, DDM, Reflection/amplification, DDoS, Amplification Factor.
url https://kjar.spu.edu.iq/index.php/kjar/article/view/559
work_keys_str_mv AT rebeenrebwarhamaamin preventingdnsmisuseforreflectionamplificationattackswithminimalcomputationaloverheadontheinternet
AT danahassan preventingdnsmisuseforreflectionamplificationattackswithminimalcomputationaloverheadontheinternet
AT masnidahussin preventingdnsmisuseforreflectionamplificationattackswithminimalcomputationaloverheadontheinternet