Preventing DNS Amplification Attacks Using the History of DNS Queries with SDN

Soyoung Kim,Sora Lee,Geumhwan Cho,Muhammad Ejaz Ahmed,Jaehoon (Paul) Jeong,Hyoungshick Kim,Jaehoon Jeong
DOI: https://doi.org/10.1007/978-3-319-66399-9_8
2017-01-01
Abstract:Domain Name System (DNS) amplification attack is a sophisticated Distributed Denial of Service (DDoS) attack by sending a huge volume of DNS name lookup requests to open DNS servers with the source address spoofed as a victim host. However, from the point of view of an individual network resource such as DNS server and switch, it is not easy to mitigate such attacks because a distributed attack could be performed with multiple DNS servers and/or switches. To overcome this limitation, we propose a novel security framework using Software-Defined Networking (SDN) to store the history of DNS queries as an evidence to distinguish normal DNS responses from attack packets. Our evaluation results demonstrate that the network traffic for DNS amplification attack can completely be blocked under various network conditions without incurring a significant communication overhead.
What problem does this paper attempt to address?