Botnets and Packet Flooding DDoS Attacks on the Domain Name System
暂无分享,去创建一个
For example, a vulnerability in software may enable a single malformed message to crash a system. In another example, an onslaught of unexpected traffi c may inhibit other legitimate communications. When these packet fl ooding attacks are sent from multiple diverse sources it becomes a distributed denial of service (DDoS) attack. The frequent and sustained packet fl ooding DDoS attacks targeted at a system or service is what we have focused on in this paper.
[1] Ted Hardie,et al. Distributing Authoritative Name Servers via Shared Unicast Addresses , 2002, RFC.
[2] S. M. Bellovin,et al. Security problems in the TCP/IP protocol suite , 1989, CCRV.
[3] Kimberly C. Claffy,et al. Two Days in the Life of the DNS Anycast Root Servers , 2007, PAM.
[4] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.