posted on 2023-11-29, 18:08authored byJonas Bushart
Shrew attacks or pulsing attacks are low-bandwidth network-level/layer-3 denial-of-service attacks. They target TCP connections by selectively inducing packet loss to affect latency and throughput. We combine the recently presented DNS CNAME-chaining attack with temporal lensing, a variant of pulsing attacks, to create a new, harder to block attack. For an attack, thousands of DNS resolvers have to be coordinated. We devise an optimization problem to find the perfect attack and solve it by using a genetic algorithm. The results show pulses created with our attack are 14 times higher than the attacker’s average bandwidth. Finally, we present countermeasures applicable to pulsing and CNAME-chaining, which also apply to this attack.
History
Preferred Citation
Jonas Bushart. Optimizing Recurrent Pulsing Attacks using Application-Layer Amplification of Open DNS Resolvers. In: IEEE Workshop on Offensive Technologies (WOOT). 2018.
Primary Research Area
Threat Detection and Defenses
Name of Conference
IEEE Workshop on Offensive Technologies (WOOT)
Legacy Posted Date
2018-08-30
Open Access Type
Unknown
BibTeX
@inproceedings{cispa_all_2634,
title = "Optimizing Recurrent Pulsing Attacks using Application-Layer Amplification of Open DNS Resolvers",
author = "Bushart, Jonas",
booktitle="{IEEE Workshop on Offensive Technologies (WOOT)}",
year="2018",
}