期刊文献+

DNS攻击检测与安全防护研究综述 被引量:7

A survey on DNS attack detection and security protection
下载PDF
导出
摘要 随着传统互联网逐渐向“互联网+”演变,域名系统(domain namesystem,DNS)从基础的地址解析向全面感知、可靠传输等新模式不断扩展。新场景下的DNS由于功能的多样性和覆盖领域的广泛性,一旦受到攻击会造成严重的后果,因此DNS攻击检测与安全防护方面的研究持续进行并越来越受到重视。首先介绍了几种常见的DNS攻击,包括DNS欺骗攻击、DNS隐蔽信道攻击、DNS DDoS(distributed denial of service)攻击、DNS反射放大攻击、恶意DGA域名;然后,从机器学习的角度出发对这些攻击的检测技术进行了系统性的分析和总结;接着,从DNS去中心化、DNS加密认证、DNS解析限制3个方面详细介绍了DNS的安全防护技术;最后,对未来的研究方向进行了展望。 With the gradual evolution of the traditional Internet to “Internet+”, the domain name system(DNS) had been continuously expanding from basic address resolution to new models such as comprehensive perception and reliable transmission. Due to the diverse functions and the extensive coverage of DNS in the new scenario, it will cause serious consequences once attacked. Therefore, the research on DNS attack detection and security protection continues and attracts more and more attention. Firstly, several common DNS attacks were introduced, including DNS spoofing, DNS covert channel, DNS distributed denial of service(DDoS) attack, DNS reflection amplification attacks,and malicious DGA domain names. Subsequently, these DNS attack detection technologies were systematically analyzed and summarized from the machine learning perspective. Then, the DNS security protection technologies were sorted out in decentralization, authenticated encryption and limited resolution. Finally, some future research directions were proposed.
作者 章坚武 安彦军 邓黄燕 ZHANG Jianwu;AN Yanjun;DENG Huangyan(Hangzhou Dianzi University,Hangzhou 310018,China;Zhejiang Uniview Technologies Co.,Ltd.,Hangzhou 310051,China)
出处 《电信科学》 2022年第9期1-17,共17页 Telecommunications Science
基金 国家自然科学基金资助项目(No.U1866209,No.61772162)。
关键词 域名系统 DNS攻击检测 安全防护 机器学习 domain name system DNS attack detection security protection machine learning
  • 相关文献

参考文献14

二级参考文献57

  • 1王垚,胡铭曾,李斌,闫伯儒.域名系统安全研究综述[J].通信学报,2007,28(9):91-103. 被引量:26
  • 2KAMINSKY D. The black OPS of DNS[A]. Proceedings of the Black Hat USA 2004[C]. Las Vegas, 2004. 被引量:1
  • 3LEIJENHORST T V, CHIN K-W, LOWED. On the viability and performance of DNS tunneling[A]. Proceedings of the 5th International Conference on Information Technology and Applications[C]. Cairns, Australia, 2008. 被引量:1
  • 4NUSSBAUM L, NEYRON P, RICHARD O. On robust covert channels inside DNS[A]. Proceedings of the 24th IF1P International Security Conference[C]. Pafos, Cyprus, 2009. 被引量:1
  • 5MERLO A, PAPALEO G, VENEZIANO S, et al. A comparativeperformance evaluation of DNS tunneling tools[A]. Proceedings of the 5th International Conference on Complex, Intelligent, and Soitware Intensive Systems[C]. Seoul, Korea, 2011.84-91. 被引量:1
  • 6REVELLI A, LEIDECKER N. Introducing heyoka: DNS tunneling 2.0[A]. Proceedings of the SOURCE Conference Boston[C]. Boston, 2009. 被引量:1
  • 7BORN K. PSUDP: a passive approach to network-wide covert communication[A]. Proceedings of the Black Hat USA 2010[C]. Las Vegas, 2010. 被引量:1
  • 8ZANDER S, ARMITAGE G, BRANCH P. A survey of covert channels and countermeasures in computer network protocols[J]. Communications Surveys & Tutorials, IEEE, 2007, 9 (3): 44-57. 被引量:1
  • 9DUSI M, CROTTI M, GRINGOLI F, et al. Tunnel hunter: detecting application-layer tunnels with statistical fingerprinting[J]. Computer Networks, 2009, 53 (1): 81-97. 被引量:1
  • 10ANDERSSON B, EKMAN E. Iodine[EB/OL]. http://eode.kryo.se/ iodine/, 2011. 被引量:1

共引文献149

同被引文献46

引证文献7

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部