Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 3
Page No. 475 - 480

Effective Amplification Mitigation and Spoofing Detection During DNS Flooding Attacks on Internet

Authors : Dana Hasan, Masnida Hussin and Azizol Abdullah

References

Anagnostopoulos, M., G. Kambourakis, P. Kopanos, G. Louloudakis and S. Gritzalis, 2013. DNS amplification attack revisited. Comput. Secur., 39: 475-485.
Direct Link  |  

Bilge, L., E. Kirda, C. Kruegel and M. Balduzzi, 2011. Exposure: Finding Malicious Domains Using Passive DNS Analysis. Northeastern University, Boston, Massachusetts,.

Kambourakis, G., T. Moschos, D. Geneiatakis and S. Gritzalis, 2007. Detecting DNS Amplification Attacks. In: Critical Information Infrastructures Security, Lopez, J. and B.M. Hammerli (Eds.). Springer, Berlin, Germany, pp: 185-196.

Koc, Y., A. Jamakovic and B. Gijsen, 2012. A global reference model of the domain name system. Int. J. Crit. Infrast. Prot., 5: 108-117.
Direct Link  |  

Liu, B., J. Li, T. Wei, S. Berg and J. Ye et al., 2015. SF-DRDoS: The store-and-flood distributed reflective denial of service attack. Comput. Commun., 69: 107-115.
Direct Link  |  

MacFarland, D.C., C.A. Shue and A.J. Kalafut, 2015. Characterizing Optimal DNS Amplification Attacks and Effective Mitigation. In: Passive and Active Network Measurement, Mirkovic J. and Y. Liu (Eds.). Springer, Berlin, Germany, pp: 15-27.

Marrison, C., 2014. DNS as an attack vector and how businesses can keep it secure. Network Secur., 2014: 17-20.
Direct Link  |  

Rossow, C., 2014. Amplification Hell: Revisiting Network Protocols for DDoS Abuse. University of Amsterdam, Amsterdam, Netherlands,.

Rozekrans T, M. Mekking and D.J. Koning, 2013. Defending Against DNS Reflection Amplification Attacks. University of Amsterdam, Amsterdam, Netherlands,.

Ye, X. and Y. Ye, 2013. A practical mechanism to counteract DNS amplification DDoS attacks. J. Comput. Inf. Syst., 9: 265-272.

Zargar, S.T., J. Joshi and D. Tipper, 2013. A survey of defense mechanisms against Distributed Denial of Service (DDoS) flooding attacks. IEEE. Commun. Surv. Tutorials, 15: 2046-2069.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved