Skip to main content

Dark Domain Name Attack: A New Threat to Domain Name System

  • Conference paper
  • First Online:
Information Systems Security (ICISS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10717))

Included in the following conference series:

Abstract

There are many domain names which are registered to DNS but unused. We define them as “dark domain name”. We show that these dark domain names have serious threat to DNS operating. From our experiments, we found that when query for dark domain names are done, the response time becomes unusually long and huge load is given for retrieval operation in DNS servers. As the result, cashing DNS server, root name server and Authoritative DNS server fall into DoS situation simultaneously, communication receives obstacles intentionally. We discuss the influence of our proposed attack and countermeasure. As the result, we face some dilemmas.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Anagnostopoulos, M., Kambourakis, G., Kopanos, P., Louloudakis, G., Gritzalis, S.: DNS amplification attack revisited. Comput. Secur. 39(Part B), 475–485 (2013)

    Article  Google Scholar 

  2. Eastlake, D.: Domain Name System Security Extensions, Request for Comments 2535. Internet Engineering Task Force, March 1999

    Google Scholar 

  3. Hacker News. https://news.ycombinator.com/

  4. Huang, C., Holt, N., Wang, Y.A., Greenberg, A., Li, J., Ross, K.W.: A DNS reflection method for global traffic management. In: USENIXATC 2010 Proceedings of the 2010 USENIX Conference on USENIX Annual Technical Conference, pp. 1–6, June 2010

    Google Scholar 

  5. ICANN: Uniform Domain Name Dispute Resolution Policy. https://www.icann.org/resources/pages/help/dndr/udrp-en. Accessed 20 July 2017

  6. Kaminsky, D.: Black ops 2008-it’s the end of the cache as we know it. In: Presented at BlackHat2008, August 2008

    Google Scholar 

  7. Mockapetris, P.: Domain Names - Concepts and Facilities, Request for Comments 1034. Internet Engineering Task Force, November 1987

    Google Scholar 

  8. NANOG63 Meeting Presentation, DNS Track, Pseudo Random DNS Query Attacks & Resolver Mitigation Approaches, Moderators D.Wessels (VeriSign), February 2015. https://www.nanog.org/sites/default/files/nanog63-dnstrack-winstead-attacks.pdf. Accessed 20 July 2017

  9. Narayan, A., Kumar, U.: A defence mechanism: DNS based DDoS attack. Int. J. Comput. Trends Technol. (IJCTT) 33(1), 1–8 (2016)

    Article  MathSciNet  Google Scholar 

  10. National Telecommunications and Information Administration: Statement of Policy on the Management of Internet Names and Addresses, Docket Number: 980212036–8146-02, December 2014

    Google Scholar 

  11. National Telecommunications and Information Administration: United States Department of Commerce, Management of Internet Names and Addresses, Docket Number: 980212036–8146-02, February 2015

    Google Scholar 

  12. Satam, P., Alipour, H., Al-Nashif, Y., Hariri, S.: Anomaly behavior analysis of DNS protocol. J. Int. Serv. Inf. Secur. (JISIS) 5(4), 85–97 (2015)

    Google Scholar 

  13. VMware Infrastructure Architecture Overview. https://www.vmware.com/

  14. WHOIS. https://who.is/

  15. Wireshark. https://www.wireshark.org/

Download references

Acknowledgment

This work was supported by JSPS KAKENHI Grant Number 17K06455.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bold Munkhbaatar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Munkhbaatar, B., Mimura, M., Tanaka, H. (2017). Dark Domain Name Attack: A New Threat to Domain Name System. In: Shyamasundar, R., Singh, V., Vaidya, J. (eds) Information Systems Security. ICISS 2017. Lecture Notes in Computer Science(), vol 10717. Springer, Cham. https://doi.org/10.1007/978-3-319-72598-7_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72598-7_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72597-0

  • Online ISBN: 978-3-319-72598-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics