Abstract
In recent years, adversaries have been launching distributed denial of service (DDoS) attacks aimed at DNS (Domain Name System) servers in various levels, and since t he DNS is a most critical fundamental service of the Internet that provides mapping between domain names and IP addresses and a prerequisite for many other services, DDoS attacks successfully causing the unavailability of DNS could bring huge losses. In this paper, we present a n easily implemented and practical scheme that can significantly alleviate the impact of the DNS DDoS attacks. Firstly, we propose interactive communications among DNS servers to obtain status information of others and with the premise we support that nameservers should not clean-up TTL-expired domain-name records in the cache when they detected that relevant nameservers are unavailable . Secondly, an evaluation based on the data of 511 , 781 , 146 DNS queries collected from four different DNS servers on the Internet shows that the DNS could still work s well in the duration of a DDoS attack by applying our approach . And further, a long term DNS analysis of about 173 days proves the prerequisite for the validity of our project on the Internet today.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.