Distributed Denial-of-Service (DDoS) attacks exhaust resources, leaving a server unavailable to legitimate clients. The Domain Name System (DNS) is a frequent target of DDoS attacks. Since DNS is a critical infrastructure service, protecting it from DoS is imperative. Many prior approaches have focused on specific filters or anti-spoofing techniques to protect generic services. DNS root nameservers are more challenging to protect, since they use fixed IP addresses, serve very diverse clients and requests, receive predominantly UDP traffic that can be spoofed, and must guarantee high quality of service. In this paper we propose a layered DDoS defense for DNS root nameservers. Our defense uses a library of defensive filters, which can be optimized for different attack types, with different levels of selectivity. We further propose a method that automatically and continuously evaluates and selects the best combination of filters throughout the attack. We show that this layered defense approach provides exceptional protection against all attack types using traces of ten real attacks from a DNS root nameserver. Our automated system can select the best defense within seconds and quickly reduces traffic to the server within a manageable range, while keeping collateral damage lower than 2%. We can handle millions of filtering rules without noticeable operational overhead.
翻译:发送拒绝服务( DDoS) 攻击耗尽资源, 使得合法客户无法使用服务器。 域名系统( DNS) 是 DDoS 攻击的常见目标 。 由于 DNS 是一个关键的基础设施服务, 保护它不受 DOS 攻击是当务之急 。 许多先前的方法都侧重于特定的过滤器或防渗漏技术, 以保护通用服务 。 DNS 根命名器更难保护, 因为他们使用固定的 IP 地址, 服务于非常多样化的客户和请求, 以UDP 为主, 接收能够被推翻的、 并且必须保证高质量的服务。 在此文件中, 我们提议为 DDoS 根命名器进行分层 DDoS 防御 。 我们的防御系统使用防御过滤器库, 可以优化不同的攻击类型, 并且有不同程度的选择性 。 我们进一步提出一种可以自动和持续地评估并选择整个攻击中过滤器的最佳组合的方法。 我们显示, 这种分层防御方法可以提供特殊保护, 防止所有攻击类型攻击, 使用来自 DNS 根代名服务器的十种真实攻击的痕迹。 我们的自动化系统可以在2 秒内选择最好的防御系统选择最好的防御系统, 并且可以快速操作服务器的频率, 。 。 我们可以控制低频程, 。