论文标题
使用分层的防御措施为根DNS服务器防御DNS服务器防止DDO
Defending Root DNS Servers Against DDoS Using Layered Defenses
论文作者
论文摘要
分布式拒绝服务(DDOS)攻击耗尽资源,使服务器无法为合法客户提供。域名系统(DNS)是DDOS攻击的常见目标。由于DNS是一项关键的基础设施服务,因此必须保护它免受DOS的影响。许多先前的方法都集中在特定的过滤器或反欺骗技术上,以保护通用服务。 DNS根名称服务器更具挑战性的保护,因为他们使用固定的IP地址,为多样化的客户和请求服务,主要接收可能被欺骗的UDP流量,并且必须保证高质量的服务。在本文中,我们为DNS根名称服务器提出了分层的DDOS防御。我们的防御使用防御性过滤器的库,可以针对不同级别的选择性进行优化。我们进一步提出了一种自动,连续评估并在整个攻击过程中选择过滤器最佳组合的方法。 We show that this layered defense approach provides exceptional protection against all attack types using traces of ten real attacks from a DNS root nameserver.我们的自动化系统可以在几秒钟内选择最佳防御,并迅速在可管理的范围内降低服务器的流量,同时使附带损害低于2%。我们可以在没有明显的操作开销的情况下处理数百万个过滤规则。
Distributed Denial-of-Service (DDoS) attacks exhaust resources, leaving a server unavailable to legitimate clients. The Domain Name System (DNS) is a frequent target of DDoS attacks. Since DNS is a critical infrastructure service, protecting it from DoS is imperative. Many prior approaches have focused on specific filters or anti-spoofing techniques to protect generic services. DNS root nameservers are more challenging to protect, since they use fixed IP addresses, serve very diverse clients and requests, receive predominantly UDP traffic that can be spoofed, and must guarantee high quality of service. In this paper we propose a layered DDoS defense for DNS root nameservers. Our defense uses a library of defensive filters, which can be optimized for different attack types, with different levels of selectivity. We further propose a method that automatically and continuously evaluates and selects the best combination of filters throughout the attack. We show that this layered defense approach provides exceptional protection against all attack types using traces of ten real attacks from a DNS root nameserver. Our automated system can select the best defense within seconds and quickly reduces traffic to the server within a manageable range, while keeping collateral damage lower than 2%. We can handle millions of filtering rules without noticeable operational overhead.