Protecting against DNS reflection attacks with Bloom filters

  • Authors:
  • Sebastiano Di Paola;Dario Lombardo

  • Affiliations:
  • Telecom Italia S.p.A., Torino, Italy;Telecom Italia S.p.A., Torino, Italy

  • Venue:
  • DIMVA'11 Proceedings of the 8th international conference on Detection of intrusions and malware, and vulnerability assessment
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Nowadays the DNS protocol is under the attention of the security community for its lack of security and for the flaws found in the last few years. In the Internet scenario, the reflection/amplification is the most common and nasty attack that requires very powerful and expensive hardware to be protected from. In this paper we propose a robust countermeasure against this type of threats based on Bloom filters. The proposed method is fast and not too eager of resources, and has a very low error rate, blocking 99.9% of attack packets. The mechanism has been implemented within a project by Telecom Italia S.p.A., named jdshape, based on Juniper Networks® SDK.