UPM Institutional Repository

Efficient authentication mechanism for defending against reflection-based attacks on domain name system


Citation

Hasan, Dana and Hama Amin, Rebeen R. and Hussin, Masnida (2020) Efficient authentication mechanism for defending against reflection-based attacks on domain name system. Kurdistan Journal of Applied Research, 5 (1). 164 - 174. ISSN 2411-7684; ESSN: 2411-7706

Abstract

Domain Name System (DNS) is one of few services on the Internet which is allowed through every security barrier. It mostly depends on the User Datagram Protocol (UDP) as the transport protocol, which is a connectionless protocol with no built-in authentication mechanism. On top of that, DNS responses are substantially larger than their corresponding requests. These two key features made DNS a fabulous attacking tool for cybercriminals to reflect and amplify a huge volume of requests to consume their victim's resources. Recent incidents revealed how harsh DNS could be when it is abused with great complexity by attackers. Moreover, these events had proven that any defense mechanism with single point deployment couldn’t accurately and efficiently overcome an attack volume with high dynamicity. In this paper, we proposed the Efficient Distributed-based Defense Scheme (EDDS) to overcome the shortcomings of a centralized-based defense mechanism. By using an authentication message exchange, which is a Challenge-Handshake Authentication Protocol (CHAP)-based authentication mechanism. It is deployed on multiple nodes to determine the legitimacy of the DNS request. Moreover, it significantly reduces the impact of the amplification factor for the fake DNS requests without having any side effects on legitimate ones. Then, a Stateful Packet Inspection (SPI)-based packet filtering is proposed to distinguish legitimate requests from fake ones by considering the results of the authentication procedure. Both authentication-message exchange and SPI-based filtering are introduced to provide detection accuracy without reducing the quality of service for legitimate users. As the simulation results show, the proposed mechanism can efficiently and accurately detect, isolate, and discard the bogus traffic with minimal overhead on the system.


Download File

[img] Text (Abstract)
DNS.pdf

Download (78kB)

Additional Metadata

Item Type: Article
Divisions: Faculty of Computer Science and Information Technology
DOI Number: https://doi.org/10.24017/science.2020.1.12
Publisher: Sulaimani Polytechnic University
Keywords: DNS; Reflection/Amplification attacks; Amplification factor; CHAP; Source authentication
Depositing User: Ms. Nuraida Ibrahim
Date Deposited: 06 Oct 2021 08:43
Last Modified: 06 Oct 2021 08:43
Altmetrics: http://www.altmetric.com/details.php?domain=psasir.upm.edu.my&doi=10.24017/science.2020.1.12
URI: http://psasir.upm.edu.my/id/eprint/88752
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item