skip to main content
10.1145/3278532.3278534acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
research-article

When the Dike Breaks: Dissecting DNS Defenses During DDoS

Published:31 October 2018Publication History

ABSTRACT

The Internet's Domain Name System (DNS) is a frequent target of Distributed Denial-of-Service (DDoS) attacks, but such attacks have had very different outcomes---some attacks have disabled major public websites, while the external effects of other attacks have been minimal. While on one hand the DNS protocol is relatively simple, the system has many moving parts, with multiple levels of caching and retries and replicated servers. This paper uses controlled experiments to examine how these mechanisms affect DNS resilience and latency, exploring both the client side's DNS user experience, and server-side traffic. We find that, for about 30% of clients, caching is not effective. However, when caches are full they allow about half of clients to ride out server outages that last less than cache lifetimes, caching and retries together allow up to half of the clients to tolerate DDoS attacks longer than cache lifetimes, with 90% query loss, and almost all clients to tolerate attacks resulting in 50% packet loss. While clients may get service during an attack, tail-latency increases for clients. For servers, retries during DDoS attacks increase normal traffic up to 8x. Our findings about caching and retries help explain why users see service outages from some real-world DDoS events, but minimal visible effects from others.

References

  1. 1.1.1.1. 2018. The Internet's Fastest, Privacy-First DNS Resolver. https://1.1.1.1/.https://1.1.1.1/Google ScholarGoogle Scholar
  2. Mario Almeida, Alessandro Finamore, Diego Perino, Narseo Vallina-Rodriguez, and Matteo Varvello. 2017. Dissecting DNS Stakeholders in Mobile Networks. In Proceedings of the 1"th International Conference on Emerging Networking EX-periments and Technologies (CoNEXT '17). ACM, New York, NY, USA, 28--34. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, and Yi Zhou. 2017. Understanding the Mirai Botnet. In Proceedings of the "6th USENIX Security Symposium. USENIX, Vancouver, BC, Canada, 1093--1110. https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-antonakakis.pdf Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Arbor Networks. 2012. Worldwide Infrastructure Security Report. Technical Report 2012 Volume VIII. Arbor Networks. http://www.arbornetworks.com/resources/infrastructure-security-reportGoogle ScholarGoogle Scholar
  5. Vaibhav Bajpai, Steffie Eravuchira, Jürgen Schönwälder, Robert Kisteleki, and Emile Aben. 2017. Vantage Point Selection for IPv6 Measurements: Benefits and Limitations of RIPE Atlas Tags. In IFIP/IEEE International Symposium on Integrated Network Management (IM "017). Lisbon, Portugal.Google ScholarGoogle ScholarCross RefCross Ref
  6. Vaibhav Bajpai, Steffie Jacob Eravuchira, and Jürgen Schönwälder. 2015. Lessons Learned from using the RIPE Atlas Platform for Measurement Research. SIGCOMM Comput. Commun. Rev. 45, 3 (July 2015), 35--42. http://www.sigcomm.org/sites/default/files/ccr/papers/2015/July/0000000--0000005.pdf Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Matt Calder, Ashley Flavel, Ethan Katz-Bassett, Ratul Mahajan, and Jitendra Padhye. 2015. Analyzing the Performance of an Anycast CDN. In Proceedings of the ACM Internet Measurement Conference. ACM, Tokyo, Japan. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. DNS OARC. 2018. DITL Traces and Analysis. https://www.dns-oarc.net/index.php/oarc/data/ditl/2018.Google ScholarGoogle Scholar
  9. R. Elz, R. Bush, S. Bradner, and M. Patton. 1997. Selection and Operation of Secondary DNS Servers. RFC 2182 (Best Current Practice)., 11 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Google. 2018. Public DNS. https://developers.google.com/speed/public-dns/. https://developers.google.com/speed/public-dns/Google ScholarGoogle Scholar
  11. Shuai Hao and Haining Wang. 2017. Exploring Domain Name Based Features on the Effectiveness of DNS Caching. SIGCOMM Comput. Commun. Rev. 47, 1 (Jan. 2017), 36--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Scott Hilton. 2016. Dyn Analysis Summary Of Friday October 21 Attack. Dyn blog https://dyn.com/blog/dyn-analysis-summary-of-friday-october-21-attack/.Google ScholarGoogle Scholar
  13. Paul Hoffman, Andrew Sullivan, and K. Fujiwara. 2018. DNS Terminology. Internet Draft. https://datatracker.ietf.org/doc/draft-ietf-dnsop-terminology-bis/?include_text=1Google ScholarGoogle Scholar
  14. ICANN. 2014. RSSAC002: RSSAC Advisory on Measurements of the Root Server System. https://www.icann.org/en/system/files/files/rssac-002-measurements-root-20nov14-en.pdf.Google ScholarGoogle Scholar
  15. ISC BIND. 2018. Chapter 6. BIND 9 Configuration Reference. https://ftp.isc.org/isc/bind9/cur/9.10/doc/arm/Bv9ARM.ch06.html.Google ScholarGoogle Scholar
  16. Sam Kottler. 2018. February 28th DDoS Incident Report | Github Engineering.. https://githubengineering.com/ddos-incident-report/.Google ScholarGoogle Scholar
  17. D. Lawrence and W. Kumari. 2017. Serving Stale Data to Improve DNS Resiliency-02. Internet Draft. https://www.ietf.org/archive/id/draft-tale-dnsop-serve-stale-02.txtGoogle ScholarGoogle Scholar
  18. P.V. Mockapetris. 1987. Domain names - concepts and facilities. RFC 1034 (Internet Standard)., 55 pages. Updated by RFCs 1101, 1183, 1348, 1876, 1982, 2065, 2181, 2308, 2535, 4033, 4034, 4035, 4343, 4035, 4592, 5936, 8020 Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. P.V. Mockapetris. 1987. Domain names - implementation and specification. RFC 1035 (Internet Standard)., 55 pages. Updated by RFCs 1101, 1183, 1348, 1876, 1982, 1995, 1996, 2065, 2136, 2181, 2137, 2308, 2535, 2673, 2845, 3425, 3658, 4033, 4034, 4035, 4343, 5936, 5966, 6604, 7766 Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Carlos Morales. 2018. February 28th DDoS Incident Report | Github EngineeringNETSCOUT Arbor Confirms 1.7 Tbps DDoS Attack; The Terabit Attack Era Is Upon Us. https://www.arbornetworks.com/blog/asert/netscout-arbor-confirms-1-7-tbps-ddos-attack-terabit-attack-era-upon-us/.Google ScholarGoogle Scholar
  21. Giovane C. M. Moura, Ricardo de O. Schmidt, John Heidemann, Wouter B. de Vries, Moritz Müller, Lan Wei, and Christian Hesselman. 2016. Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event. In Proceedings of the ACM Internet Measurement Conference. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Giovane C. M. Moura, John Heidemann, Moritz Müller, Ricardo de O. Schmidt, and Marco Davids. 2018. Datasets from "When the Dike Breaks: Dissecting DNS Defenses During DDoS". (May 2018). Web page https://ant.isi.edu/datasets/dns/Moura18a_data.Google ScholarGoogle Scholar
  23. Giovane C. M. Moura, John Heidemann, Moritz Müller, Ricardo de O. Schmidt, and Marco Davids. 2018. When the Dike Breaks:Dissecting DNS Defenses During DDoS (extended). Technical Report ISI-TR-725b. USC/Information Sciences Institute. https://www.isi.edu/%7ejohnh/PAPERS/Moura18a.html (updated Sept. 2018).Google ScholarGoogle Scholar
  24. Moritz Müller, Giovane C. M. Moura, Ricardo de O. Schmidt, and John Heidemann. 2017. Recursives in the Wild: Engineering Authoritative DNS Servers. In Proceedings of the ACM Internet Measurement Conference. London, UK, 489--495. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. NL Netlabs. 2018. NL Netlabs Documentation - Unbound - undbound.conf.5. https://nlnetlabs.nl/documentation/unbound/unbound.conf/.Google ScholarGoogle Scholar
  26. OpenDNS. 2018. Setup Guide: OpenDNS. https://www.opendns.com/setupguide/. https://www.opendns.com/setupguideGoogle ScholarGoogle Scholar
  27. Jianping Pan, Y Thomas Hou, and Bo Li. 2003. An overview of DNS-based server selections in content distribution networks. Computer Networks 43, 6 (2003), 695--711. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Jeffrey Pang, Aditya Akella, Anees Shaikh, Balachander Krishnamurthy, and Srinivasan Seshan. 2004. On the Responsiveness of DNS-based Network Control. In Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement (IMC '04). ACM, New York, NY, USA, 21--26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Jeffrey Pang, James Hendricks, Aditya Akella, Roberto De Prisco, Bruce Maggs, and Srinivasan Seshan. 2004. Availability, Usage, and Deployment Characteristics of the Domain Name System. In Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement (IMC '04). ACM, New York, NY, USA, 1--14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Paul Vixie and Gerry Sneeringer and Mark Schleifer. 2002. Events of 21-Oct-2002. http://c.root-servers.org/october21.txt.Google ScholarGoogle Scholar
  31. Nicole Perlroth. 2016. Hackers Used New Weapons to Disrupt Major Websites Across U.S. New York Times (Oct. 22 2016), A1. http://www.nytimes.com/2016/10/22/business/internet-problems-attack.htmlGoogle ScholarGoogle Scholar
  32. Nicole Perlroth. 2016. Tally of Cyber Extortion Attacks on Tech Companies Grows. New York Times Bits Blog, http://bits.blogs.nytimes.com/2014/06/19/tally-of-cyber-extortion-attacks-on-tech-companies-grows/.Google ScholarGoogle Scholar
  33. Alec Peterson. 2017. EC2 resolver changing TTL on DNS answers? Post on the DNS-OARC dns-operations mailing list, https://lists.dns-oarc.net/pipermail/dns-operations/2017-November/017043.html.Google ScholarGoogle Scholar
  34. Quad9. 2018. Quad9 | Internet Security & Privacy In a Few Easy Steps. https://quad9.net.Google ScholarGoogle Scholar
  35. RIPE NCC. 2017. RIPE Atlas Measurement IDS. https://atlas.ripe.net/measurements/ID. ID is the experiment ID: TTL60: 10443671, TTL1800: 10507676, TTL3600: 10536725, TTL86400: 10579327, TTL3600--10min: 10581463, A:10859822, B: 11102436, C:11221270, D:11804500, E: 11831403, F: 11831403, G: 12131707, H:12177478, I: 12209843.Google ScholarGoogle Scholar
  36. RIPE NCC Staff. 2015. RIPE Atlas: A Global Internet Measurement Network. Internet Protocol Journal (IPJ) 18, 3 (Sep 2015), 2--26.Google ScholarGoogle Scholar
  37. RIPE Network Coordination Centre. 2018. RIPE Atlas - Raw data structure documentations, https://atlas.ripe.net/docs/data_struct/.Google ScholarGoogle Scholar
  38. Root Server Operators. 2015. Events of 2015-11-30. http://root-servers.org/news/events-of-20151130.txt.Google ScholarGoogle Scholar
  39. Root Server Operators. 2016. Events of 2016-06-25. Technical Report. Root Server Operators. http://www.root-servers.org/news/events-of-20160625.txtGoogle ScholarGoogle Scholar
  40. Root Server Operators. 2017. Root DNS. http://root-servers.org/.Google ScholarGoogle Scholar
  41. José Jair Santanna, Roland van Rijswijk-Deij, Rick Hofstede, Anna Sperotto, Mark Wierbosch, Lisandro Zambenedetti Granville, and Aiko Pras. 2015. Booters---An Analysis of DDoS-as-a-Service Attacks. In Proceedings of the 14th IFIP/IEEE Interatinoal Symposium on Integrated Network Management. IFIP, Ottowa, Canada.Google ScholarGoogle ScholarCross RefCross Ref
  42. D. Schinazi and T. Pauly. 2017. Happy Eyeballs Version 2:Better Connectivity Using Concurrency. RFC 8305. Internet Request For Comments.Google ScholarGoogle Scholar
  43. Ricardo de O. Schmidt, John Heidemann, and Jan Harm Kuipers. 2017. Anycast Latency: How Many Sites Are Enough?. In Proceedings of the Passive and Active Measurement Workshop. Springer, Sydney, Australia, 188--200. http://www.isi.edu/%7ejohnh/PAPERS/Schmidt17a.htmlGoogle ScholarGoogle ScholarCross RefCross Ref
  44. Bruce Schneier. 2016. Lessons From the Dyn DDoS Attack. blog https://www.schneier.com/essays/archives/2016/11/lessons_from_the_dyn.html.Google ScholarGoogle Scholar
  45. Kyle Schomp, Tom Callahan, Michael Rabinovich, and Mark Allman. 2013. On measuring the client-side DNS infrastructure. In Proceedings of the "015 ACM Conference on Internet Measurement Conference. ACM, 77--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Somini Sengupta. 2012. After Threats, No Signs of Attack by Hackers. New York Times (Apr. 1 2012), A1. http://www.nytimes.com/2012/04/01/technology/no-signs-of-attack-on-internet.htmlGoogle ScholarGoogle Scholar
  47. SIDN Labs. 2017. .nl stats and data. http://stats.sidnlabs.nl.Google ScholarGoogle Scholar
  48. Matthew Thomas and Duane Wessels. 2015. A study of caching behavior with respect to root server TTLs. DNS-OARC. https://indico.dns-oarc.net/event/24/contributions/374/Google ScholarGoogle Scholar
  49. Unbound. 2018. Unbound Documentation. https://www.unbound.net/documentation/unbound.conf.html.Google ScholarGoogle Scholar
  50. Weinberg, M., Wessels, D. 2016. Review and analysis of attack traffic against A-root and J-root on November 30 and December 1, 2015. In: DNS OARC 24 - Buenos Aires, Argentina. https://indico.dns-oarc.net/event/22/session/4/contribution/7.Google ScholarGoogle Scholar
  51. Maarten Wullink, Giovane CM Moura, Moritz Müller, and Cristian Hesselman. 2016. ENTRADA: A high-performance network traffic data streaming warehouse. In Network Operations and Management Symposium (NOMS), "016 IEEE/IFIP. IEEE, 913--918.Google ScholarGoogle ScholarCross RefCross Ref
  52. Yingdi Yu, Duane Wessels, Matt Larson, and Lixia Zhang. 2012. Authority Server Selection in DNS Caching Resolvers. SIGCOMM Comput. Commun. Rev. 42, 2 (March 2012), 80--86. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    IMC '18: Proceedings of the Internet Measurement Conference 2018
    October 2018
    507 pages
    ISBN:9781450356190
    DOI:10.1145/3278532

    Copyright © 2018 ACM

    Publication rights licensed to ACM. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of the United States government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 31 October 2018

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate277of1,083submissions,26%

    Upcoming Conference

    IMC '24
    ACM Internet Measurement Conference
    November 4 - 6, 2024
    Madrid , AA , Spain

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader