Please use this identifier to cite or link to this item: https://idr.l3.nitk.ac.in/jspui/handle/123456789/14731
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSanjay
dc.contributor.authorRajendran B.
dc.contributor.authorShetty P.
dc.date.accessioned2021-05-05T10:15:42Z-
dc.date.available2021-05-05T10:15:42Z-
dc.date.issued2020
dc.identifier.citationProceedings of the 5th International Conference on Inventive Computation Technologies, ICICT 2020 , Vol. , , p. 230 - 236en_US
dc.identifier.urihttps://doi.org/10.1109/ICICT48043.2020.9112413
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/14731-
dc.description.abstractDNS is a critical infrastructure service of the Internet that translates hostnames to network IP addresses and vice versa. The criticality of DNS can be evidenced by the fact that all most all organizations and enterprises do not block DNS traffic, as it would eventually stop access to the Internet. As a result, attackers have been exploiting the DNS infrastructure and using it as a launchpad for carrying out various attacks e.g. DoS/DDoS, DNS reflection amplification, DNS tunneling, NXDOMAIN attack, and DNS hijacking, etc. During the historic implementation of DNS protocol, its security was not considered which lead to the exploitation of various vulnerabilities in the DNS infrastructure.This paper brings out the technicalities behind DNS amplification and DNS tunneling attacks and presents a number of countermeasures and mitigation techniques to protect against these attacks and the DNS Infrastructure. © 2020 IEEE.en_US
dc.titleDNS Amplification DNS Tunneling Attacks Simulation, Detection and Mitigation Approachesen_US
dc.typeConference Paperen_US
Appears in Collections:2. Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.