Design of Robust DNS by Intrusion Detection
暂无分享,去创建一个
DNS (Domain Name System) servers and resolvers (clients) are inherently prone to the simple forms of attack, such as DDoS (Distributed Denial of Service) and stack smashing, since the basic query protocol is based on UDP, which has no protection against these types of attacks. In this paper, we analyze the DNS design issues regarding the communication robustness between the servers and resolvers, and propose a design method to reduce the risk of the service disruption by introducing T/TCP (Transactional TCP) and the IDS (Intrusion Detection System) for the DNS protocol.
[1] Edward G. Amoroso. Intrusion Detection , 1999 .
[2] Robert Braden,et al. T/TCP - TCP Extensions for Transactions Functional Specification , 1994, RFC.
[3] Vern Paxson,et al. An analysis of using reflectors for distributed denial-of-service attacks , 2001, CCRV.
[4] David L. Mills,et al. Simple Network Time Protocol (SNTP) Version 4 for IPv4, IPv6 and OSI , 1996, RFC.
[5] Kevin Barraclough,et al. I and i , 2001, BMJ : British Medical Journal.