The best bang for the byte: Characterizing the potential of DNS amplification attacks

Douglas C. MacFarland,Craig A. Shue,Andrew J. Kalafut
DOI: https://doi.org/10.1016/j.comnet.2017.02.007
IF: 5.493
2017-04-01
Computer Networks
Abstract:DNS amplification has been instrumental in over 34% of high-volume network DDoS attacks, with some floods exceeding 300 Gbps. Today’s best practices require Internet-wide cooperation and have been unable to prevent these attacks. In this work, we investigate whether these best practices can eliminate DNS amplification attacks and characterize what threats remain. In particular, we study roughly 130 million DNS domains and their associated servers to determine the DNS amplification potential associated with each. We find attackers can easily use these servers to create crippling floods and that few servers employ any protection measures to deter attackers.
computer science, information systems,telecommunications,engineering, electrical & electronic, hardware & architecture
What problem does this paper attempt to address?