M. Anagnostopoulos, G. Kambourakis, S. Gritzalis, David K. Y. Yau
{"title":"Never say never: Authoritative TLD nameserver-powered DNS amplification","authors":"M. Anagnostopoulos, G. Kambourakis, S. Gritzalis, David K. Y. Yau","doi":"10.1109/NOMS.2018.8406224","DOIUrl":null,"url":null,"abstract":"DNS amplification attack is a significant and persistent threat to the Internet. Authoritative name servers (ANSes) of popular domains, especially the DNSSEC-enabled ones, give attractive leverage for attackers in distributed denial-of-service (DDoS) attacks. Particularly, the ANS list of top-level domains (TLD) is publicly accessible, including by would-be attackers, in the form of a root.zone file. In this work, we examine the potential of TLD ANSes to be exploited as unknowing agents in DNS amplification attacks. Specifically, over a period of 12 months that covers two different versions of the root.zone file, we assess the amplification factor (AF) that these servers may provide to attackers when replying to both individual and multiple queries. Also, we measure the degree of actual adoption of the recommended response rate limiting (RRL) countermeasure for the ANSes. Our major findings are that (i) 70% of the distinct ANSes and 47% of the possible DNS queries for the TLDs produce a large AF that exceeds 60, (ii) 10% of the distinct ANSes reflect inbound network traffic and magnify it by a factor that exceeds 50, (iii) the number of most useful ANSes for the attacker, in terms of their role as amplifiers, appears increasing during the monitoring period, and (iv) there still exists a significant number of ANSes that do not implement the RRL or leave it inactive.","PeriodicalId":19331,"journal":{"name":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","volume":"3 2 1","pages":"1-9"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NOMS.2018.8406224","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
DNS amplification attack is a significant and persistent threat to the Internet. Authoritative name servers (ANSes) of popular domains, especially the DNSSEC-enabled ones, give attractive leverage for attackers in distributed denial-of-service (DDoS) attacks. Particularly, the ANS list of top-level domains (TLD) is publicly accessible, including by would-be attackers, in the form of a root.zone file. In this work, we examine the potential of TLD ANSes to be exploited as unknowing agents in DNS amplification attacks. Specifically, over a period of 12 months that covers two different versions of the root.zone file, we assess the amplification factor (AF) that these servers may provide to attackers when replying to both individual and multiple queries. Also, we measure the degree of actual adoption of the recommended response rate limiting (RRL) countermeasure for the ANSes. Our major findings are that (i) 70% of the distinct ANSes and 47% of the possible DNS queries for the TLDs produce a large AF that exceeds 60, (ii) 10% of the distinct ANSes reflect inbound network traffic and magnify it by a factor that exceeds 50, (iii) the number of most useful ANSes for the attacker, in terms of their role as amplifiers, appears increasing during the monitoring period, and (iv) there still exists a significant number of ANSes that do not implement the RRL or leave it inactive.
DNS放大攻击是互联网面临的一个重大而持久的威胁。流行域的权威域名服务器(ANSes),特别是支持dnssec的域名服务器,在分布式拒绝服务(DDoS)攻击中为攻击者提供了诱人的优势。特别是,顶级域名(TLD)的ANS列表是公开访问的,包括潜在的攻击者,以根的形式。区域文件。在这项工作中,我们研究了TLD ANSes在DNS放大攻击中作为未知代理被利用的潜力。具体来说,在12个月的时间里,它涵盖了两个不同版本的根。区域文件,我们评估这些服务器在回答单个和多个查询时可能向攻击者提供的放大因子(AF)。此外,我们还度量了ANSes实际采用推荐的响应速率限制(RRL)对策的程度。我们的主要发现是:(i) 70%的不同ansse和47%的顶级域名可能的DNS查询产生超过60的大AF, (ii) 10%的不同ansse反映入站网络流量并将其放大超过50倍,(iii)对攻击者最有用的ansse的数量,就其放大器的作用而言,在监测期间似乎在增加。及(iv)仍有相当数量的安防机构没有实施“区域规划规划”或使其处于不运作状态。