Protecting against DNS reflection attacks with bloom filters

10Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Nowadays the DNS protocol is under the attention of the security community for its lack of security and for the flaws found in the last few years. In the Internet scenario, the reflection/amplification is the most common and nasty attack that requires very powerful and expensive hardware to be protected from. In this paper we propose a robust countermeasure against this type of threats based on Bloom filters. The proposed method is fast and not too eager of resources, and has a very low error rate, blocking 99.9% of attack packets. The mechanism has been implemented within a project by Telecom Italia S.p.A., named jdshape, based on Juniper Networks® SDK. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Di Paola, S., & Lombardo, D. (2011). Protecting against DNS reflection attacks with bloom filters. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6739 LNCS, pp. 1–16). https://doi.org/10.1007/978-3-642-22424-9_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free