Classifying DNS Servers based on Response Message Matrix using Machine Learning

11/09/2021
by   Keiichi Shima, et al.
0

Improperly configured domain name system (DNS) servers are sometimes used as packet reflectors as part of a DoS or DDoS attack. Detecting packets created as a result of this activity is logically possible by monitoring the DNS request and response traffic. Any response that does not have a corresponding request can be considered a reflected message; checking and tracking every DNS packet, however, is a non-trivial operation. In this paper, we propose a detection mechanism for DNS servers used as reflectors by using a DNS server feature matrix built from a small number of packets and a machine learning algorithm. The F1 score of bad DNS server detection was more than 0.9 when the test and training data are generated within the same day, and more than 0.7 for the data not used for the training and testing phase of the same day.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/17/2023

Measurement Based Evaluation and Mitigation of Flood Attacks on a LAN Test-Bed

The IoT's vulnerability to network attacks has motivated the design of i...
research
03/04/2022

NFSlicer: Data Movement Optimization for Shallow Network Functions

Network Function (NF) deployments on commodity servers have become ubiqu...
research
06/19/2023

Protecting IoT Servers Against Flood Attacks with the Quasi Deterministic Transmission Policy

IoT Servers that receive and process packets from IoT devices should mee...
research
10/14/2019

A Glimpse of the Matrix (Extended Version): Scalability Issues of a New Message-Oriented Data Synchronization Middleware

Matrix is a new message-oriented data synchronization middleware, used a...
research
02/10/2023

TurboTLS: TLS connection establishment with 1 less round trip

We show how to establish TLS connections using one less round trip. In o...
research
05/18/2020

NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities

The Domain Name System (DNS) infrastructure, a most critical system the ...
research
01/26/2018

Simulation for L3 Volumetric Attack Detection

The detection of a volumetric attack involves collecting statistics on t...

Please sign up or login with your details

Forgot password? Click here to reset