Loading [MathJax]/extensions/MathMenu.js
DNS flooding attack detection scheme through Machine Learning | IEEE Conference Publication | IEEE Xplore

DNS flooding attack detection scheme through Machine Learning


Abstract:

Domain Name System (DNS) servers are considered registers that enable internet devices to quickly look up specific web servers and access web pages. DNS flooding is a typ...Show More

Abstract:

Domain Name System (DNS) servers are considered registers that enable internet devices to quickly look up specific web servers and access web pages. DNS flooding is a type of distributed denial of service (DDoS) attack in which an attacker overwhelms DNS servers with a huge number of resolution requests. Such an attack can prevent DNS servers from responding to legitimate traffic. In this paper, we propose a new approach that relies on monitoring and analyzing incoming DNS requests to identify flooding attacks against DNS servers. The detection is carried out using a Machine Learning-based Intrusion Detection System at the entry point of networks. We analyze the performance of different machine learning methods (decision tree, random forest, XGBoost, SVM, K-nearest neighbors, logistic regression, and Multi-Layer Perceptron) for detecting DNS flooding attacks. The evaluation was conducted in the context of emulated attacks. The obtained results reveal that all six methods exhibit the capability to effectively detect DNS attacks, even when dealing with low attack rates. This highlights the robustness of these methods and their potential to maintain high accuracy levels in identifying DNS attack patterns.
Date of Conference: 27-31 May 2024
Date Added to IEEE Xplore: 17 July 2024
ISBN Information:

ISSN Information:

Conference Location: Ayia Napa, Cyprus

Contact IEEE to Subscribe

References

References is not available for this document.