A Matter of Degree: Characterizing the Amplification Power of Open DNS Resolvers
Autor: | Yazdani, Ramin, Rijswijk-Deij, Roland van, Jonker, Mattijs, Sperotto, Anna, Hohlfeld, Oliver, Moura, Giovane, Pelsser, Cristel |
---|---|
Přispěvatelé: | Design and Analysis of Communication Systems, Digital Society Institute |
Rok vydání: | 2022 |
Předmět: | |
Zdroj: | Passive and Active Measurement ISBN: 9783030987848 Passive and Active Network Measurement: 23rd International Conference, PAM 2022, Virtual Event, March 28–30, 2022, Proceedings, 293-318 STARTPAGE=293;ENDPAGE=318;TITLE=Passive and Active Network Measurement |
Popis: | Open DNS resolvers are widely misused to bring about reflection and amplification DDoS attacks. Indiscriminate efforts to address the issue and take down all resolvers have not fully resolved the problem, and millions of open resolvers still remain available to date, providing attackers with enough options. This brings forward the question if we should not instead focus on eradicating the most problematic resolvers, rather than all open resolvers indiscriminately. Contrary to existing studies, which focus on quantifying the existence of open resolvers, this paper focuses on infrastructure diversity and aims at characterizing open resolvers in terms of their ability to bring about varying attack strengths. Such a characterization brings nuances to the problem of open resolvers and their role in amplification attacks, as it allows for more problematic resolvers to be identified. Our findings show that the population of open resolvers lies above 2.6M range over our one-year measurement period. On the positive side, we observe that the majority of identified open resolvers cut out when dealing with bulky and DNSSEC-related queries, thereby limiting their potential as amplifiers. We show, for example, that 59% of open resolvers lack DNSSEC support. On the downside, we see that a non-negligible number of open resolvers facilitate large responses toANYandTXTqueries (8.1% and 3.4% on average, respectively), which stands to benefit attackers. Finally we show that by removing around 20% of potent resolvers the global DNS amplification potential can be reduced by up to 80%. |
Databáze: | OpenAIRE |
Externí odkaz: |