Detection and filtering system for DNS water torture attacks relying only on domain name information

7Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.

Abstract

Water torture attacks are a recently emerging type of Distributed Denial-of-Service (DDoS) attack on Domain Name System (DNS) servers. They generate a multitude of malicious queries with randomized, unique subdomains. This paper proposes a detection method and a filtering system for water torture attacks. The former is an enhancement of our previous effort so as to achieve packet-by-packet, on-the-fly processing, and the latter is an application of our current method mainly for defending recursive servers. Our proposed method detects malicious queries by analyzing their subdomains with a näive Bayes classifier. Considering large-scale applications, we focus on achieving high throughput as well as high accuracy. Experimental results indicate that our method can detect attacks with 98.16% accuracy and only a 1.55% false positive rate, and that our system can process up to 7.44 Mpps of traffic.

Cite

CITATION STYLE

APA

Yoshida, T., Kawakami, K., Kobayashi, R., Kato, M., Okada, M., & Kishimoto, H. (2017). Detection and filtering system for DNS water torture attacks relying only on domain name information. Journal of Information Processing, 25, 854–865. https://doi.org/10.2197/ipsjjip.25.854

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free