Please use this identifier to cite or link to this item: http://hdl.handle.net/123456789/15849
Title: DNS Amplification Attack Detection via Flexible Flow (sFlow)
Authors: A. A. A. M. ATAN, M. N. M. M. NOOR
M. N. ISMAIL
Issue Date: 4-Apr-2017
Abstract: High availability plays a vital role in the Information Age. Ensuring availability involves the protection against network threats that could lead to unavailability, such as a Distributed Denial of Service (DDoS) attack. Relatively, Domain Name System (DNS) amplification attack is one of the biggest DDoS to date. The attack takes advantage of the circumstance that a small DNS query can cause amplified DNS replies. In regard to today's rapid networks, recent defense approaches have focused more on flowbased analysis as alternative countermeasure due to its efficacy in monitoring anomalous behaviour against fast-paced data streaming. However, fixed flow-monitoring application (i.e. NetFlow) is apparently known for its deferred processing mode which causes prominent delays in DDoS detection. Conversely, this paper proposed a method of detecting DNS amplification attack via flexible flow analysis. Preliminary results are based on the utilization of s Flow, immediate cache, and extended flow values involving DNS attributes.
URI: http://ir.unikl.edu.my/jspui/handle/123456789/15849
Appears in Collections:Journal Articles

Files in This Item:
File Description SizeFormat 
DNS Amplification Attack Detection via Flexible Flow _sFlow_.pdf6.47 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.