{"title":"DoS packet filter using DNS information","authors":"Tsuyoshi Chiba, T. Katoh, B. B. Bista, T. Takata","doi":"10.1109/AINA.2006.155","DOIUrl":null,"url":null,"abstract":"A DoS (denial of service) attack is one of the most serious threats in the Internet. It is important to protect the resources and services from the DoS attack, but it is difficult to distinguish normal traffic and DoS attack traffic because the DoS attackers generally hide their true identities/origins. In this paper, we propose a technique to reduce the influence of the DoS attack without disturbing the demand of the regular users by allocating the information, when DoS attack occurs, to the filtering rules. This can be done by using DNS request replies.","PeriodicalId":185969,"journal":{"name":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AINA.2006.155","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
A DoS (denial of service) attack is one of the most serious threats in the Internet. It is important to protect the resources and services from the DoS attack, but it is difficult to distinguish normal traffic and DoS attack traffic because the DoS attackers generally hide their true identities/origins. In this paper, we propose a technique to reduce the influence of the DoS attack without disturbing the demand of the regular users by allocating the information, when DoS attack occurs, to the filtering rules. This can be done by using DNS request replies.