Fingerprinting Internet DNS Amplification DDoS Activities
Title | Fingerprinting Internet DNS Amplification DDoS Activities |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Fachkha, C., Bou-Harb, E., Debbabi, M. |
Conference Name | New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on |
Date Published | March |
Keywords | anti-spam organizations, attack duration, backscattered analysis, Computer crime, computer network security, cyber security intelligence, darknet space, detection period, distributed denial of service, fingerprinting Internet DNS amplification DDoS activities, geolocation, Grippers, Internet, Internet-scale DNS amplification DDoS attacks, IP networks, Monitoring, network-layer, packet size, Sensors, storage capacity 720 Gbit |
Abstract | This work proposes a novel approach to infer and characterize Internet-scale DNS amplification DDoS attacks by leveraging the darknet space. Complementary to the pioneer work on inferring Distributed Denial of Service (DDoS) using darknet, this work shows that we can extract DDoS activities without relying on backscattered analysis. The aim of this work is to extract cyber security intelligence related to DNS Amplification DDoS activities such as detection period, attack duration, intensity, packet size, rate and geo- location in addition to various network-layer and flow-based insights. To achieve this task, the proposed approach exploits certain DDoS parameters to detect the attacks. We empirically evaluate the proposed approach using 720 GB of real darknet data collected from a /13 address space during a recent three months period. Our analysis reveals that the approach was successful in inferring significant DNS amplification DDoS activities including the recent prominent attack that targeted one of the largest anti-spam organizations. Moreover, the analysis disclosed the mechanism of such DNS amplification DDoS attacks. Further, the results uncover high-speed and stealthy attempts that were never previously documented. The case study of the largest DDoS attack in history lead to a better understanding of the nature and scale of this threat and can generate inferences that could contribute in detecting, preventing, assessing, mitigating and even attributing of DNS amplification DDoS activities. |
DOI | 10.1109/NTMS.2014.6814019 |
Citation Key | 6814019 |
- geolocation
- storage capacity 720 Gbit
- sensors
- packet size
- network-layer
- Monitoring
- IP networks
- Internet-scale DNS amplification DDoS attacks
- internet
- Grippers
- anti-spam organizations
- fingerprinting Internet DNS amplification DDoS activities
- distributed denial of service
- detection period
- darknet space
- cyber security intelligence
- computer network security
- Computer crime
- backscattered analysis
- attack duration