EconPapers    
Economics at your fingertips  
 

Hotlist and stale content update mitigation in local databases for DNS flooding attacks

Tasnuva Mahjabin (), Yang Xiao (), Tieshan Li () and Mohsen Guizani ()
Additional contact information
Tasnuva Mahjabin: The University of Alabama
Yang Xiao: The University of Alabama
Tieshan Li: University of Electronic Science and Technology of China
Mohsen Guizani: Mohamed bin Zayed University of Artificial Intelligence (MBZUAI)

Telecommunication Systems: Modelling, Analysis, Design and Management, 2022, vol. 81, issue 3, No 6, 417-430

Abstract: Abstract Domain name system (DNS) works like a phone book in the Internet address resolution process. It translates user-provided domain names into corresponding IP addresses and thus helps to connect to those domains. For its important role in Internet connectivity and the emerging growth of the Internet of Things (IoT) devices, recent massive distributed denial of service (DDoS) flooding attacks target this important infrastructure. The significance behind this kind of attack is huge. A successful DDoS flooding attack in DNS makes hundreds of domain names unreachable. This paper proposes a mitigation mechanism for this DNS flooding attack in which stale content updates and a hotlist in DNS local databases are utilized in local/low-tier DNS servers. This hotlist contains domain records from different upper-level DNS servers, and these domain names are the top most queried domain names of those servers so that when the DNS is under attack, those domains in the hotlist still can be accessed. This hotlist is implemented using piggyback response messages not to cost much overhead. Furthermore, we propose a stale content update method for DNS local database, which periodically updates the stale contents to keep the database fresh. Simulation runs show good results from this hotlist content, and during an extreme outage for the DNS flooding attack, hotlist contents serve over $$80\%$$ 80 % of the total responses of the database.

Keywords: Internet of Things (IoT); IoT attacks; Domain name system (DNS) flooding attacks; Security; Distributed denial of service (DDoS); Hotlists; DNS local database; Stale update (search for similar items in EconPapers)
Date: 2022
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
http://link.springer.com/10.1007/s11235-022-00950-x Abstract (text/html)
Access to the full text of the articles in this series is restricted.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:telsys:v:81:y:2022:i:3:d:10.1007_s11235-022-00950-x

Ordering information: This journal article can be ordered from
http://www.springer.com/journal/11235

DOI: 10.1007/s11235-022-00950-x

Access Statistics for this article

Telecommunication Systems: Modelling, Analysis, Design and Management is currently edited by Muhammad Khan

More articles in Telecommunication Systems: Modelling, Analysis, Design and Management from Springer
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-03-20
Handle: RePEc:spr:telsys:v:81:y:2022:i:3:d:10.1007_s11235-022-00950-x