Netinfo Security ›› 2019, Vol. 19 ›› Issue (9): 56-60.doi: 10.3969/j.issn.1671-1122.2019.09.012
• Orginal Article • Previous Articles Next Articles
Qiaoli YUE, Wanbo LV, Weihong HU, Haikuo ZHANG
Received:
2019-07-15
Online:
2019-09-10
Published:
2020-05-11
CLC Number:
Qiaoli YUE, Wanbo LV, Weihong HU, Haikuo ZHANG. Mitigating DDoS Attack Based on DNS Response Value Assessment[J]. Netinfo Security, 2019, 19(9): 56-60.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2019.09.012
[1] | YUAN Pengpeng, WANG Changqing.Research on DNS Security Threats and Countermeasures[J]. Information Security and Technology, 2018, 9(5): 50-54. |
苑朋朋,王常青. DNS安全威胁及应对措施研究[J].网络空间安全,2018,9(5):50-54. | |
[2] | THOMAS D R, CLAYTON R, BERESFORD A R.1000 Days of UDP Amplification DDoS Attacks[C]//IEEE. 2017 APWG Symposium on Electronic Crime Research, April 25-27, 2017, Scottsdale, AZ, USA. New York: IEEE, 2017: 79-84. |
[3] | ALIEYAN K, KADHUM M M, ANBAR M, et al.An Overview of DDoS Attacks Based on DNS[C]//IEEE. 7th International Conference on Information and Communication Technology Convergence, October 19-21, 2016, Jeju, South Korea. New York: IEEE, 2016: 276-280. |
[4] | ANAGNOSTOPOULOS M, KAMBOURAKIS G, GRITZALIS S, et al.Never Say Never: Authoritative TLD Nameserver-powered DNS Amplification[C]//IEEE. 16th IEEE/IFIP Network Operations and Management Symposium, April 23-27, 2018, Taipei, China. New York: IEEE, 2018: 1-9. |
[5] | LI Heng, SHEN Huawei, CHENG Xueqi, et al.Review of Network High Flow Distributed Denial of Service Attack and Defense Mechanisms[J]. Netinfo Security, 2017, 17(5): 37-43. |
李恒,沈华伟,程学旗,等.网络高流量分布式拒绝服务攻击防御机制研究综述[J].信息网络安全,2017,17(5): 37-43. | |
[6] | VIXIE P. Extension Mechanisms for DNS (EDNS0)[EB/OL]. , 1999-8-1. |
[7] | MA Xinlei, CHEN Yonghong.DDoS Detection Method Based on Chaos Analysis of Network Traffic Entropy[J]. IEEE Communications Letters, 2013, 18(1): 114-117. |
[8] | LIU C, ALBITZ P.DNS and Bind (5th Edition)[M]. Sebastopol, CA, USA: O’Reilly Media, 2006. |
[9] | DONNERHACKE L. DNS Dampening[EB/OL]. , 2012-9-23. |
[10] | GUO Fanglu, CHEN Jiawu, CHIUEH T.Spoof Detection for Preventing DoS Attacks against DNS Servers[C]//IEEE. 26th IEEE International Conference on Distributed Computing Systems, July 4-7, 2006, Lisboa, Portugal. New York: IEEE, 2006: 37-37. |
[11] | ARENDS R, AUSTEIN R, LARSON M, et al. Protocol Modifications for the DNS Security Extensions[EB/OL]. , 2005-3-1. |
[12] | ARENDS R, AUSTEIN R, LARSON M, et al. Resource Records for the DNS Security Extensions[EB/OL]. , 2005-3-1. |
[13] | VAN RIJSWIJK-DEIJ R, SPEROTTO A, PRAS A. DNSSEC and its Potential for DDoS Attacks: A Comprehensive Measurement Study[C]//ACM. The 2014 Internet Measurement Conference, November 5-7, 2014, Vancouver, BC, Canada. New York: ACM, 2014: 449-460. |
[14] | VAUGHN R, EVRON G. DNS Amplification Attacks (Preliminary Release)[EB/OL]., 2006-3-17. |
[15] | LIAN W, RESCORLA E, SHACHAM H, et al.Measuring the Practical Impact of DNSSEC Deployment[C]//USENIX. 22nd USENIX Conference on Security, August 14-16, 2013, Washington, DC. Berkeley, CA, USA: USENIX Association, 2013: 573-588. |
[16] | BLACKA D, LAURIE B, SISSON G, et al. DNS Security (DNSSEC) Hashed Authenticated Denial of Existence[EB/OL]. , 2008-3-1. |
[17] | SAATY T L.How to Make a Decision: The Analytic Hierarchy Process[J]. European Journal of Operational Research, 1990, 48(1): 9-26. |
[1] | Zhiyan ZHAO, Xiaomo JI. Research on the Intelligent Fusion Model of Network Security Situation Awareness [J]. Netinfo Security, 2020, 20(4): 87-93. |
[2] | Min LIU, Shuhui CHEN. Research on VoLTE Traffic Based on Association Fusion [J]. Netinfo Security, 2020, 20(4): 81-86. |
[3] | Lingyu BIAN, Linlin ZHANG, Kai ZHAO, Fei SHI. Ethereum Malicious Account Detection Method Based on LightGBM [J]. Netinfo Security, 2020, 20(4): 73-80. |
[4] | Yifeng DU, Yuanbo GUO. A Dynamic Access Control Method for Fog Computing Based on Trust Value [J]. Netinfo Security, 2020, 20(4): 65-72. |
[5] | Zhizhou FU, Liming WANG, Ding TANG, Shuguang ZHANG. HBase Secondary Ciphertext Indexing Method Based on Homomorphic Encryption [J]. Netinfo Security, 2020, 20(4): 55-64. |
[6] | Rong WANG, Chunguang MA, Peng WU. An Intrusion Detection Method Based on Federated Learning and Convolutional Neural Network [J]. Netinfo Security, 2020, 20(4): 47-54. |
[7] | Xiaoli DONG, Shuai SHANG, Jie CHEN. Impossible Differential Attacks on 9-Round Block Cipher Rijndael-192 [J]. Netinfo Security, 2020, 20(4): 40-46. |
[8] | Chun GUO, Changqing CHEN, Guowei SHEN, Chaohui JIANG. A Ransomware Classification Method Based on Visualization [J]. Netinfo Security, 2020, 20(4): 31-39. |
[9] | Lu CHEN, Yajie SUN, Liqiang ZHANG, Yun CHEN. A Scheme of Measurement for Terminal Equipment Based on DICE in IoT [J]. Netinfo Security, 2020, 20(4): 21-30. |
[10] | Jinfang JIANG, Guangjie HAN. Survey of Trust Management Mechanism in Wireless Sensor Network [J]. Netinfo Security, 2020, 20(4): 12-20. |
[11] | Jianwei LIU, Yiran HAN, Bin LIU, Beiyuan YU. Research on 5G Network Slicing Security Model [J]. Netinfo Security, 2020, 20(4): 1-11. |
[12] | Peng LIU, Qian HE, Wangyang LIU, Xu CHENG. CP-ABE Scheme Supporting Attribute Revocation and Outsourcing Decryption [J]. Netinfo Security, 2020, 20(3): 90-97. |
[13] | Yubo SONG, Ming FAN, Junjie YANG, Aiqun HU. Multipath Solution and Blocking Method of Network Attack Traffic Based on Topology Analysis [J]. Netinfo Security, 2020, 20(3): 9-17. |
[14] | Tengfei WANG, Manchun CAI, Tianliang LU, Ting YUE. IPv6 Network Attack Source Tracing Method Based on iTrace_v6 [J]. Netinfo Security, 2020, 20(3): 83-89. |
[15] | Yi ZHANG, Hongyan LIU, Hequn XIAN, Chengliang TIAN. A Cloud Storage Encrypted Data Deduplication Method Based on Authorization Records [J]. Netinfo Security, 2020, 20(3): 75-82. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||