The far side of DNS amplification: Tracing the DDoS attack ecosystem from the internet core

27Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we shed new light on the DNS amplification ecosystem, by studying complementary data sources, bolstered by orthogonal methodologies. First, we introduce a passive attack detection method for the Internet core, i.e., at Internet eXchange Points (IXPs). Surprisingly, IXPs and honeypots observe mostly disjoint sets of attacks: 96% of IXP-inferred attacks were invisible to a sizable honeypot platform. Second, we assess the effectiveness of observed DNS attacks by studying IXP traces jointly with diverse data from independent measurement infrastructures. We find that attackers efficiently detect new reflectors and purposefully rotate between them. At the same time, we reveal that attackers are a small step away from bringing about significantly higher amplification factors (14×). Third, we identify and fingerprint a major attack entity by studying patterns in attack traces. We show that this entity dominates the DNS amplification ecosystem by carrying out 59% of the attacks, and provide an in-depth analysis of its behavior over time. Finally, our results reveal that operators of various .gov names do not adhere to DNSSEC key rollover best practices, which exacerbates amplification potential. We can verifiably connect this operational behavior to misuses and attacker decision-making.

References Powered by Scopus

Detecting honeypots and other suspicious environments

137Citations
N/AReaders
Get full text

Booters - An analysis of DDoS-as-a-service attacks

132Citations
N/AReaders
Get full text

Taming the 800 pound gorilla: The rise and decline of NTP DDoS attacks

121Citations
N/AReaders
Get full text

Cited by Powered by Scopus

TuDoor Attack: Systematically Exploring and Exploiting Logic Vulnerabilities in DNS Response Pre-processing with Malformed Packets

11Citations
N/AReaders
Get full text

Cloud Watching: Understanding Attacks Against Cloud-Hosted Services

10Citations
N/AReaders
Get full text

Routing Loops as Mega Amplifiers for DNS-Based DDoS Attacks

10Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Nawrocki, M., Jonker, M., Schmidt, T. C., & Wahlisch, M. (2021). The far side of DNS amplification: Tracing the DDoS attack ecosystem from the internet core. In Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC (pp. 419–434). Association for Computing Machinery. https://doi.org/10.1145/3487552.3487835

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 9

75%

Researcher 3

25%

Readers' Discipline

Tooltip

Computer Science 9

69%

Engineering 3

23%

Environmental Science 1

8%

Save time finding and organizing research with Mendeley

Sign up for free