Nikos Kostopoulos, Stavros Korentis, D. Kalogeras, B. Maglaris
{"title":"Mitigation of DNS Water Torture Attacks within the Data Plane via XDP-Based Naive Bayes Classifiers","authors":"Nikos Kostopoulos, Stavros Korentis, D. Kalogeras, B. Maglaris","doi":"10.1109/CloudNet53349.2021.9657122","DOIUrl":null,"url":null,"abstract":"Water Torture is a DDoS attack vector that exhausts the processing resources of victim Authoritative DNS Servers. By crafting DNS requests involving names that appear once and are unknown to the victim, attackers bypass the DNS caches of intermediary Recursive DNS Servers (Resolvers), hence forwarding the entire attack traffic to the victim. As a countermeasure, machine learning algorithms have been proposed to filter attack traffic on Resolvers.Our proposed schema implements via programmable data plane methods efficient machine learning algorithms that differentiate between legitimate and DDoS attack traffic within cloud infrastructures. Specifically, we leverage on XDP to implement data plane Naive Bayes Classifier inference and effectively mitigate Water Torture attacks within data center Resolvers. DNS requests regarded as invalid by the Naive Bayes Classifier are dropped within the Linux kernel before any resources are allocated to them, while valid ones are forwarded to the user space to be resolved.Our schema was assessed via a proof of concept setup within a virtualized environment, with learning and testing performed via legitimate and malicious DNS data records with statistical properties consistent with datasets widely reported in the literature. Our experiments mainly focused on evaluating the filtering throughput of the proposed mitigation schema given the constraints imposed by XDP. We conclude that our XDP-based Naive Bayes Classifier significantly decreases the volume of attack traffic within the data plane, thus efficiently safeguarding Resolvers.","PeriodicalId":369247,"journal":{"name":"2021 IEEE 10th International Conference on Cloud Networking (CloudNet)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 10th International Conference on Cloud Networking (CloudNet)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CloudNet53349.2021.9657122","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Water Torture is a DDoS attack vector that exhausts the processing resources of victim Authoritative DNS Servers. By crafting DNS requests involving names that appear once and are unknown to the victim, attackers bypass the DNS caches of intermediary Recursive DNS Servers (Resolvers), hence forwarding the entire attack traffic to the victim. As a countermeasure, machine learning algorithms have been proposed to filter attack traffic on Resolvers.Our proposed schema implements via programmable data plane methods efficient machine learning algorithms that differentiate between legitimate and DDoS attack traffic within cloud infrastructures. Specifically, we leverage on XDP to implement data plane Naive Bayes Classifier inference and effectively mitigate Water Torture attacks within data center Resolvers. DNS requests regarded as invalid by the Naive Bayes Classifier are dropped within the Linux kernel before any resources are allocated to them, while valid ones are forwarded to the user space to be resolved.Our schema was assessed via a proof of concept setup within a virtualized environment, with learning and testing performed via legitimate and malicious DNS data records with statistical properties consistent with datasets widely reported in the literature. Our experiments mainly focused on evaluating the filtering throughput of the proposed mitigation schema given the constraints imposed by XDP. We conclude that our XDP-based Naive Bayes Classifier significantly decreases the volume of attack traffic within the data plane, thus efficiently safeguarding Resolvers.