{"id":1948,"date":"2022-11-21T08:02:00","date_gmt":"2022-11-21T16:02:00","guid":{"rendered":"https:\/\/ant.isi.edu\/blog\/?p=1948"},"modified":"2023-01-06T11:46:43","modified_gmt":"2023-01-06T19:46:43","slug":"new-paper-defending-root-dns-servers-against-ddos-using-layered-defenses-at-comsnets-2023","status":"publish","type":"post","link":"https:\/\/ant.isi.edu\/blog\/?p=1948","title":{"rendered":"new paper &#8220;Defending Root DNS Servers Against DDoS Using Layered Defenses&#8221; at COMSNETS 2023 (best paper!)"},"content":{"rendered":"\n<p>Our paper titled &#8220;<strong><a href=\"https:\/\/www.isi.edu\/~johnh\/PAPERS\/Rizvi23a.html\">Defending Root DNS Servers Against DDoS Using Layered Defenses<\/a><\/strong>&#8221; will appear at <strong><a href=\"https:\/\/www.comsnets.org\/accepted_papers.html\">COMSNETS 2023<\/a><\/strong> in January 2023. In this work, by ASM Rizvi, Jelena Mirkovic, John Heidemann, Wes Hardaker, and Robert Story, we design an automated system named DDIDD with multiple filters to handle an ongoing DDoS attack on a DNS root server. We evaluated ten real-world attack events on B-root and showed <em>DDIDD<\/em> could successfully mitigate these attack events. We released the datasets for these attack events on our <a href=\"https:\/\/ant.isi.edu\/datasets\/all.html\">dataset webpage<\/a> (dataset names starting with B_Root_Anomaly).<\/p>\n\n\n\n<p><em>Update in January: we are happy to announce that this paper was awarded Best Paper for COMSNETS 2023!  Thanks for the recognition.<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2022\/11\/paper-table.png\"><img loading=\"lazy\" decoding=\"async\" width=\"981\" height=\"325\" src=\"https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2022\/11\/paper-table.png\" alt=\"\" class=\"wp-image-1949\" srcset=\"https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2022\/11\/paper-table.png 981w, https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2022\/11\/paper-table-300x99.png 300w, https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2022\/11\/paper-table-768x254.png 768w\" sizes=\"auto, (max-width: 981px) 100vw, 981px\" \/><\/a><figcaption class=\"wp-element-caption\">Table II from [Rizvi23a] shows the performance of each individual filter, with near-best results in bold.   This table shows that one filter covers all cases, but together in DDIDD they provide very tood defense.\n\n<\/figcaption><\/figure>\n\n\n\n<p>From the abstract:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Distributed Denial-of-Service (DDoS) attacks exhaust resources, leaving a server unavailable to legitimate clients. The Domain Name System (DNS) is a frequent target of DDoS attacks. Since DNS is a critical infrastructure service, protecting it from DoS is imperative. Many prior approaches have focused on specific filters or anti-spoofing techniques to protect generic services. DNS root nameservers are more challenging to protect, since they use fixed IP addresses, serve very diverse clients and requests, receive predominantly UDP traffic that can be spoofed, and must guarantee high quality of service. In this paper we propose a layered DDoS defense for DNS root nameservers. Our defense uses a library of defensive filters, which can be optimized for different attack types, with different levels of selectivity. We further propose a method that automatically and continuously evaluates and selects the best combination of filters throughout the attack. We show that this layered defense approach provides exceptional protection against all attack types using traces of real attacks from a DNS root nameserver. Our automated system can select the best defense within seconds and quickly reduce the traffic to the server within a manageable range while keeping collateral damage lower than 2%. We can handle millions of filtering rules without noticeable operational overhead.<\/p>\n<\/blockquote>\n\n\n\n<p>This work is partially supported by the National Science<br \/>Foundation (grant NSF OAC-1739034) and DHS HSARPA<br \/>Cyber Security Division (grant SHQDC-17-R-B0004-TTA.02-<br \/>0006-I), in collaboration with NWO.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2023\/01\/best-paper.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"689\" src=\"https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2023\/01\/best-paper-1024x689.png\" alt=\"\" class=\"wp-image-1969\" srcset=\"https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2023\/01\/best-paper-1024x689.png 1024w, https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2023\/01\/best-paper-300x202.png 300w, https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2023\/01\/best-paper-768x517.png 768w, https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2023\/01\/best-paper-1200x808.png 1200w, https:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2023\/01\/best-paper.png 1426w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption class=\"wp-element-caption\">A screen capture of the presentation of the best paper award.<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our paper titled &#8220;Defending Root DNS Servers Against DDoS Using Layered Defenses&#8221; will appear at COMSNETS 2023 in January 2023. In this work, by ASM Rizvi, Jelena Mirkovic, John Heidemann, Wes Hardaker, and Robert Story, we design an automated system named DDIDD with multiple filters to handle an ongoing DDoS attack on a DNS root [&hellip;]<\/p>\n","protected":false},"author":998,"featured_media":1949,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[289,278,284,282,1],"tags":[141,168,360,339,154,63,359,58,5,57],"class_list":["post-1948","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-dns","category-internet","category-papers-publications","category-publications","category-uncategorized","tag-ant","tag-best-paper","tag-comsnets","tag-ddidd","tag-ddos","tag-dns","tag-filtering","tag-isi","tag-papers","tag-usc"],"_links":{"self":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1948","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/users\/998"}],"replies":[{"embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1948"}],"version-history":[{"count":9,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1948\/revisions"}],"predecessor-version":[{"id":1971,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts\/1948\/revisions\/1971"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/media\/1949"}],"wp:attachment":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1948"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1948"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}