The Domain Name System (DNS) is a critical Internet
infrastructure that provides name to address mapping services.
In the past few years, distributed denial of service
(DDoS) attacks have targeted the DNS infrastructure and
threaten to disrupt this critical service. In this paper we
show that the existing DNS can gain significant resilience
against DDoS attacks through a simple change to the current
DNS operations, by setting longer time-to-live values
for a special class of DNS resource records, the infrastructure
records. These records are used to navigate the
DNS hierarchy and change infrequently. Furthermore, in
combination with a set of simple and incrementally deployable
record renewal policies, the DNS service availability
can be improved by one order of magnitude. Our approach
requires neither additional physical resources nor
any change to the existing DNS design. We evaluate the
effectiveness of our proposed enhancement by using DNS
traces collected from multiple locations.
Keywords: DDoS, DNS, resilience, caching
The Domain Name System (DNS)  provides name
services for the Internet. It maps hostnames to IP addresses
and also provides services for a growing number of other
applications, such as mapping IP addresses to geographic
locations or directory services for legacy telephony applications.
Furthermore, protocols such as SMTP and SIP depend
on the DNS in order to route messages through appropriate
application level gateways. As a result, the availability
of the DNS can affect the availability of a large number
of Internet applications. Ensuring the DNS data availability
is an essential part of prov...
... middle of paper ...
...weil, D. Massey, and L. Zhang. Improving
DNS Service Availability by Using Long TTL Values. Internet
 K. Parka, V. Pai, L. Peterson, and Z. Wang. CoDNS: Improving
DNS Performance and Reliability via Cooperative Lookups. In Proceedings
of OSDI, 2004.
 V. Ramasubramanian and E. Sirer. The Design and Implementation
of a Next Generation Name Service for the Internet. In Proceedings
of SIGCOMM, pages 331–342, 2004.
 H. Yang, H. Luo, Y. Yang, S. Lu, and L. Zhang. HOURS: Achieving
DoS Resilience in an Open Service Hierarchy. In Proceedings of
DSN, pages 83–93, 2004.
37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07)
0-7695-2855-4/07 $20.00 © 2007
Authorized licensed use limited to: WICHITA STATE UNIVERSITY LIBRARIES. Downloaded on March 01,2010 at 12:23:24 EST from IEEE Xplore. Restrictions apply.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Within the last decade, the internet has proven to be the most efficient way to complete tasks in today’s society. Every major business in today’s society relies on the internet to conduct business. Though the internet is a useful tool, our reliability on it opens up the door for cyber-attacks that can be detrimental to business as a whole. One example of a cyber-attacks that have recently started becoming more prevalent are DDoS attacks. Recently, DDoS attacks have been a rising issue for businesses owners who run their own servers, such as video game companies and other high profile web servers, including banks and other credit card payment gateways.... [tags: DDoS Attacks, Cyber Terrorism]
627 words (1.8 pages)
- Denial of Service Attacks Definition: Denial of Service. A cracker attack that overloads a server to the point that it no longer responds or shuts down completely. To flood a network or individual server with huge amounts of data packets. How it Works In a typical connection, the user sends a message asking the server to authenticate it. The server returns the authentication approval to the user. The user acknowledges this approval and then is allowed onto the server. In a denial of service attack, the user sends several authentication requests to the server, filling it up.... [tags: Essays Papers]
877 words (2.5 pages)
- Denial of Service attacks (DoS) or Distributed Denial of Service Attacks (DDoS), have been around for many years, but only in the past few years have the frequency and magnitude of these attacks increased. They are a significant problem because they can shut an organization off from the Internet for extended periods of time and little can be done to stop them. DoS attacks occur when computer resources become unavailable to legitimate users after being exhausted by false requests for information (Houle and Weaver 1).... [tags: Computers]
2204 words (6.3 pages)
- ... Occasionally, survivors of mass killing operations bore witness to the killing program” (USHMM). Arad mentions about the success of the Soviet Army that helped to provide more evidence about the Holocaust, “by the summer of 1943, the Soviet army had advanced into Nazi occupied land and prevented the Germans from completing their plan to erase all evidence” (355-366). The Germans took extreme measures to not leave behind any evidence of the top secret operation by the use code words, and verbally commanding the officers (355).... [tags: Nazi Germany, Adolf Hitler, Holocaust denial]
1254 words (3.6 pages)
- ... With the Nessus tool from Tenable I would be able to discover specific vulnerabilities attackers would potentially violate to break security of a software product . This tool can do a variety of things such as “data gathering, Host identification, port scanning, plugin selection and reporting of data” (Course Technology, 2014) The Nessus scan tool works as a remote security scan tool which can scan computers with different operating systems. This would be ideal in this environment given the mix of Windows and Unix operating systems.... [tags: Operating system, Microsoft Windows, Security]
1202 words (3.4 pages)
- Growing up, people learn about the past of their own kind and of the world they live in. One reads history in books, hears history from parents, and studies history at schools. Knowing the history of one's ancestors allows one to understand the past and change for a better future. Significant battles, civil movements, and reformations teach people valuable lessons and help the society to improve. The Holocaust, one of the most well-known history events, represents a perfect historical example of discrimination and racism.... [tags: adolf hitler, facist leaders, nazi]
1333 words (3.8 pages)
- Background Located in Seattle Washington, the iPremier company is a web-based commerce company founded in 1996 by two students from Swarthmore College. Since its founding, iPremier has registered a success story in e-commerce selling vintage, luxury and rare goods over the internet. Customers use their credit cards to transact business online. With impressive sales and profit margins, iPremier is among the few companies who survived the 2000 technical stock recession (Austin, 2007). Management at iPremier consists of young employees who were its pioneers and a number of experienced managers recruited over time.... [tags: Business Operations Analysis]
908 words (2.6 pages)
- Tracing the Source of Denial of Service Attacks Abstract: Denial of service attacks are becoming increasingly prevalent and serious, yet the anonymity that these attacks affords the hacker provides no means for a victim to trace the attack. The weakness of the TCP/IP protocol allows for this anonymity, yet it would be very difficult to change this protocol. Savage, Wetherall, Karlin, and Anderson present a method for tracing back the source IP address and network path of denial of service attacks.... [tags: Exploratory Essays Research Papers]
2010 words (5.7 pages)
- “One is astonished in the study of history at the recurrence of the idea that evil must be forgotten, distorted, skimmed over. The difficulty, of course, with this philosophy is that history loses its value as an incentive and example; it paints perfect men and noble nations, but it does not tell the truth.” -W.E.B Du Bois, Black Reconstruction, 1935 As early as age thirteen, we start learning about the Holocaust in classrooms and in textbooks. We learn that in the 1940s, the German Nazi party (led by Adolph Hitler) intentionally performed a mass genocide in order to try to breed a perfect population of human beings.... [tags: Holocaust Denial Essays]
2232 words (6.4 pages)
- Denial So you don’t think that you are an alcoholic. Chances are that you are not, but this is the thought that many who are unknowingly addicted to alcohol or other mind-altering agents. This denial barrier is the first of many hurdles to overcome when they are identified as having an addiction disorder. Although all denial isn’t bad most of the time, addicts are often the last to recognize their disease, pursuing their addictions into mental illness, the degeneration of health, and ultimately death.... [tags: Papers]
1170 words (3.3 pages)