Visible to the public Measuring IPv6 DNS Reconnaissance Attacks and Preventing Them Using DNS Guard

TitleMeasuring IPv6 DNS Reconnaissance Attacks and Preventing Them Using DNS Guard
Publication TypeConference Paper
Year of Publication2018
AuthorsHu, Qinwen, Asghar, Muhammad Rizwan, Brownlee, Nevil
Conference Name2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
ISBN Number978-1-5386-5596-2
Keywordsaddress scanning attacks, brute force attacks, Computer crime, computer network security, DNS, DNS Guard, IDS, Internet, IP networks, IPv4 address space, IPv6, IPv6 addresses, IPv6 DNS reconnaissance attacks, IPv6 network reconnaissance, IPv6 reconnaissance techniques, naive brute forcing approach, Network reconnaissance, Protocols, pubcrawl, Reconnaissance, resilience, Resiliency, Scalability, Servers
Abstract

Traditional address scanning attacks mainly rely on the naive 'brute forcing' approach, where the entire IPv4 address space is exhaustively searched by enumerating different possibilities. However, such an approach is inefficient for IPv6 due to its vast subnet size (i.e., 264). As a result, it is widely assumed that address scanning attacks are less feasible in IPv6 networks. In this paper, we evaluate new IPv6 reconnaissance techniques in real IPv6 networks and expose how to leverage the Domain Name System (DNS) for IPv6 network reconnaissance. We collected IPv6 addresses from 5 regions and 100,000 domains by exploiting DNS reverse zone and DNSSEC records. We propose a DNS Guard (DNSG) to efficiently detect DNS reconnaissance attacks in IPv6 networks. DNSG is a plug and play component that could be added to the existing infrastructure. We implement DNSG using Bro and Suricata. Our results demonstrate that DNSG could effectively block DNS reconnaissance attacks.

URLhttps://ieeexplore.ieee.org/document/8416497
DOI10.1109/DSN.2018.00045
Citation Keyhu_measuring_2018