Abstract
Water torture attacks are a recently emerging type of Distributed Denial-of-Service (DDoS) attack on Domain Name System (DNS) servers. They generate a multitude of malicious queries with randomized, unique subdomains. This paper proposes a detection method and a filtering system for water torture attacks. The former is an enhancement of our previous effort so as to achieve packet-by-packet, on-the-fly processing, and the latter is an application of our current method mainly for defending recursive servers. Our proposed method detects malicious queries by analyzing their subdomains with a näive Bayes classifier. Considering large-scale applications, we focus on achieving high throughput as well as high accuracy. Experimental results indicate that our method can detect attacks with 98.16% accuracy and only a 1.55% false positive rate, and that our system can process up to 7.44 Mpps of traffic.
Author supplied keywords
Cite
CITATION STYLE
Yoshida, T., Kawakami, K., Kobayashi, R., Kato, M., Okada, M., & Kishimoto, H. (2017). Detection and filtering system for DNS water torture attacks relying only on domain name information. Journal of Information Processing, 25, 854–865. https://doi.org/10.2197/ipsjjip.25.854
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.