作者: Georgios Kambourakis , Tassos Moschos , Dimitris Geneiatakis , Stefanos Gritzalis
DOI: 10.1007/978-3-540-89173-4_16
关键词:
摘要: DNS amplification attacks massively exploit open recursive servers mainly for performing bandwidth consumption DDoS attacks. The effect lies in the fact that response messages may be substantially larger than query messages. In this paper, we present and evaluate a novel practical method is able to distinguish between authentic bogus replies. proposed scheme can effectively protect local acting both proactively reactively. Our analysis corresponding real-usage experimental results demonstrate offers flexible, robust effective solution.