Hotlist and stale content update mitigation in local databases for DNS flooding attacks
Tasnuva Mahjabin (),
Yang Xiao (),
Tieshan Li () and
Mohsen Guizani ()
Additional contact information
Tasnuva Mahjabin: The University of Alabama
Yang Xiao: The University of Alabama
Tieshan Li: University of Electronic Science and Technology of China
Mohsen Guizani: Mohamed bin Zayed University of Artificial Intelligence (MBZUAI)
Telecommunication Systems: Modelling, Analysis, Design and Management, 2022, vol. 81, issue 3, No 6, 417-430
Abstract:
Abstract Domain name system (DNS) works like a phone book in the Internet address resolution process. It translates user-provided domain names into corresponding IP addresses and thus helps to connect to those domains. For its important role in Internet connectivity and the emerging growth of the Internet of Things (IoT) devices, recent massive distributed denial of service (DDoS) flooding attacks target this important infrastructure. The significance behind this kind of attack is huge. A successful DDoS flooding attack in DNS makes hundreds of domain names unreachable. This paper proposes a mitigation mechanism for this DNS flooding attack in which stale content updates and a hotlist in DNS local databases are utilized in local/low-tier DNS servers. This hotlist contains domain records from different upper-level DNS servers, and these domain names are the top most queried domain names of those servers so that when the DNS is under attack, those domains in the hotlist still can be accessed. This hotlist is implemented using piggyback response messages not to cost much overhead. Furthermore, we propose a stale content update method for DNS local database, which periodically updates the stale contents to keep the database fresh. Simulation runs show good results from this hotlist content, and during an extreme outage for the DNS flooding attack, hotlist contents serve over $$80\%$$ 80 % of the total responses of the database.
Keywords: Internet of Things (IoT); IoT attacks; Domain name system (DNS) flooding attacks; Security; Distributed denial of service (DDoS); Hotlists; DNS local database; Stale update (search for similar items in EconPapers)
Date: 2022
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
http://link.springer.com/10.1007/s11235-022-00950-x Abstract (text/html)
Access to the full text of the articles in this series is restricted.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:spr:telsys:v:81:y:2022:i:3:d:10.1007_s11235-022-00950-x
Ordering information: This journal article can be ordered from
http://www.springer.com/journal/11235
DOI: 10.1007/s11235-022-00950-x
Access Statistics for this article
Telecommunication Systems: Modelling, Analysis, Design and Management is currently edited by Muhammad Khan
More articles in Telecommunication Systems: Modelling, Analysis, Design and Management from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().