skip to main content
10.1145/3297156.3297272acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsaiConference Proceedingsconference-collections
research-article

A Large Scale Analysis of DNS Water Torture Attack

Published: 08 December 2018 Publication History
  • Get Citation Alerts
  • Abstract

    Random domains are widely used in present network environment. In the benign services, they have been utilized as disposable domains to transfer one-time signals. However, in recent, based on the convenience of random domains, some cybercriminals have utilized them to launch DNS water torture attack, a kind of DDoS attack targeting on the authoritative servers. Most of the Researchers dedicate in analyzing the random domains used for DGA (Domain Generation Algorithm) malware C&C communication rather than the DNS water torture attack. In order to get more facts about the nature of this kind of attacks, we compare behaviors of the DNS water torture attack with the DGA malware and disposable service from three aspects, i.e., time pattern, lexical property and the participants (clients and victims). Based on a month of real-world DNS traffic, we find that, first, the volume of the DNS water torture attack is significantly larger than the volume of disposable domains and DGA queries. Second, the character distribution of domains generated in the DNS water torture attacks are more random than disposable domains and DGA domains. Third, the client IP launching the DNS water torture attack are all random generated fake addresses. Fourth, the victims are themselves lawbreaker, e.g., pornographic website and gambling website. At last, we give some advices based on the analysis result to mitigate the DNS water torture attack.

    References

    [1]
    Yizheng Chen, Manos Antonakakis, Roberto Perdisci, Yacin Nadji, David Dagon, and Wenke Lee. 2014. DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Trafc. In 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2014, Atlanta, GA, USA, June 23--26, 2014. 598--609.
    [2]
    Hyrum S. Anderson, Jonathan Woodbridge, and Bobby Filar. 2016. DeepDGA: Adversarially-Tuned Domain Generation and Detection. In Proceedings of the 2016 ACM Workshop
    [3]
    Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou II, SaeedAbu-Nimeh, Wenke Lee, and David Dagon. 2012. From Throw-Away Trafc toBots: Detecting the Rise of DGA-Based Malware. In USENIX Security Symposium. 491--506.
    [4]
    Pratyusa K. Manadhata, Sandeep Yadav, Prasad Rao, and William Horne. 2014. Detecting Malicious Domains via Graph Inference. In Proceedings of the 2014 Workshop on Artifcial Intelligent and Security Workshop, AISec 2014, Scottsdale, AZ, USA, November 7, 2014. 59--60.
    [5]
    Daniel Plohmann, Khaled Yakdan, Michael Klatt, Johannes Bader, and Elmar Gerhards-Padilla. 2016. A Comprehensive Measurement Study of Domain Generating Malware. In 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10--12, 2016. 263--278. https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/plohmann
    [6]
    Stefano Schiavoni, Federico Maggi, Lorenzo Cavallaro, and Stefano Zanero. 2014. Phoenix: DGA-Based Botnet Tracking and Intelligence. In Detection of Intrusions and Malware, and Vulnerability Assessment - 11th International Conference, DIMVA 2014, Egham, UK, July 10--11, 2014. Proceedings. 192--211.
    [7]
    Reza Sharifnya and Mahdi Abadi. 2015. DFBotKiller: Domain-flux botnet detection based on the history of group activities and failures in DNS trafc. Digital Investigation 12 (2015), 15--26.
    [8]
    Jonathan Woodbridge, Hyrum S. Anderson, Anjum Ahuja, and Daniel Grant. 2016. Predicting Domain Generation Algorithms with Long Short-Term Memory Networks. CoRR abs/1611.00791 (2016). http://arxiv.org/abs/1611.00791
    [9]
    Jonathan Woodbridge, Hyrum S. Anderson, Anjum Ahuja, and Daniel Grant. 2016. Predicting Domain Generation Algorithms with Long Short-Term Memory Networks. CoRR abs/1611.00791 (2016). http://arxiv.org/abs/1611.00791
    [10]
    Sandeep Yadav, Ashwath Kumar Krishna Reddy, A. L. Narasimha Reddy, and Supranamaya Ranjan. 2010. Detecting algorithmically generated malicious domain names. In Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, IMC 2010, Melbourne, Australia November 1--3, 2010. 48--61.
    [11]
    Sandeep Yadav and A. L. Narasimha Reddy. 2011. Winning with DNS Failures: Strategies for Faster Botnet Detection. In Security and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, London, UK, September 7--9, 2011, Revised Selected Papers. 446--459.
    [12]
    Jonghoon Kwon, Jehyun Lee, Heejo Lee, and Adrian Perrig. 2016. PsyBoG: A scalable botnet detection method for large-scale DNS trafc. Computer Networks 97 (2016), 48--73.
    [13]
    {n. d.}. The Bro Network Security Monitor. https://www.bro.org
    [14]
    {n. d.}. The evolution of the Nymaim Criminal Enterprise. https://www2.deloitte.com/content/dam/Deloitte/us/Documents/risk us-aers-the-evolution-of-the-nymaim-criminal-enterprise.pdf.
    [15]
    Chaz Lever, Platon Kotzias, Davide Balzarotti, Juan Caballero, and Manos Antonakakis. 2017. A Lustrum of Malware Network Communication: Evolution and Insights. In 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, May 22--26, 2017. 788--804.

    Cited By

    View all
    • (2023)NRDelegationAttackProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620416(3187-3204)Online publication date: 9-Aug-2023
    • (2023)Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS ServersProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616647(296-310)Online publication date: 15-Nov-2023
    • (2023)Collaborative Defense Framework Using FQDN-Based Allowlist Filter Against DNS Water Torture AttackIEEE Transactions on Network and Service Management10.1109/TNSM.2023.327788020:4(3968-3983)Online publication date: 1-Dec-2023
    • Show More Cited By

    Index Terms

    1. A Large Scale Analysis of DNS Water Torture Attack

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      CSAI '18: Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence
      December 2018
      641 pages
      ISBN:9781450366069
      DOI:10.1145/3297156
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      In-Cooperation

      • Shenzhen University: Shenzhen University

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 08 December 2018

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. DGA
      2. DNS
      3. DNS Water Torture Attack
      4. DdoS
      5. Disposable Domain
      6. Random Domain

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      CSAI '18

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)42
      • Downloads (Last 6 weeks)6

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)NRDelegationAttackProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620416(3187-3204)Online publication date: 9-Aug-2023
      • (2023)Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS ServersProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616647(296-310)Online publication date: 15-Nov-2023
      • (2023)Collaborative Defense Framework Using FQDN-Based Allowlist Filter Against DNS Water Torture AttackIEEE Transactions on Network and Service Management10.1109/TNSM.2023.327788020:4(3968-3983)Online publication date: 1-Dec-2023
      • (2023)The Closed Resolver Project: Measuring the Deployment of Inbound Source Address ValidationIEEE/ACM Transactions on Networking10.1109/TNET.2023.325741331:6(2589-2603)Online publication date: Dec-2023
      • (2022)Learning-Based Detection of Malicious Hosts by Analyzing Non-Existent DNS ResponsesGLOBECOM 2022 - 2022 IEEE Global Communications Conference10.1109/GLOBECOM48099.2022.10001429(3411-3416)Online publication date: 4-Dec-2022
      • (2021)Transparent forwardersProceedings of the 17th International Conference on emerging Networking EXperiments and Technologies10.1145/3485983.3494872(454-462)Online publication date: 2-Dec-2021
      • (2021)DNS water torture detection in the data planeProceedings of the SIGCOMM '21 Poster and Demo Sessions10.1145/3472716.3472854(24-26)Online publication date: 23-Aug-2021
      • (2021)Source Address ValidationEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-642-27739-9_1626-1(1-5)Online publication date: 19-Jan-2021
      • (2020)NXNSAttackProceedings of the 29th USENIX Conference on Security Symposium10.5555/3489212.3489248(631-648)Online publication date: 12-Aug-2020
      • (2019)Taxonomy and Adversarial Strategies of Random Subdomain Attacks2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)10.1109/NTMS.2019.8763820(1-5)Online publication date: Jun-2019
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media