Skip to main content
Log in

Efficient and secure DNS cyber shelter on DDoS attacks

  • Original Paper
  • Published:
Journal of Computer Virology and Hacking Techniques Aims and scope Submit manuscript

Abstract

DDoS (distributed denial of service) attack is one of the most effective cyber-attack on the Internet. Many researchers focus on DDoS countermeasures. Many countermeasures of DDoS have been developed. However, there is no perfect solution for DDoS because DDoS attacks use normal requests which are hardly detected. DDoS attacks typically exhaust bandwidth, processing capacity, or memory of a targeted machine, service or network. Despite countless efforts in against DDoS attacks in the past decade, DDoS attacks are still a serious threat to the Internet environment. In this research, DNS cyber shelter is proposed. DNS cyber shelter is sort of DMZ (DE military Zone) which is separated by inside networks. DNS cyber shelter monitors or analyzes every outside requests for possible malicious behaviors or threats. Therefore, DNS cyber shelter will be able to detect and defense DDoS attack effectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Attaluri, S., McGhee, S., Stamp, M.: Profile hidden Markov models and metamorphic virus detection. J. Comput. Virol. 5(2), 151–169 (2009)

    Article  Google Scholar 

  2. Borello, J.-M., Mé, L.: Code obfuscation techniques for metamorphic viruses. J. Comput. Virol. (2008, to appear) (2008)

  3. Choi, J.-W., Chun, M.-J.: A proposal countermeasure to DDoS attcks targeted DNS, Kongju national University. 2012, 729–730 (2012)

  4. Choi, J.-W., Chun, M.-J.: A proposal countermeasure to DDoS attcks targeted DNS, Kongju national University. 2012, 731 (2012)

  5. Choi, Y., Oh, J., Jang, J., Ryu, J., Ryu, J.: DDoS attack countermeasure system research. Inform. Secur. 19(5), 11–20 (2009)

    Google Scholar 

  6. Kambourakis, G., Moschos, T., Geneiatakis, D., Gritzalis, S.: Detecting DNS amplification attacks. Crit. Inform. Infrastruct. Secur. ser Lecture Notes Comput. Sci. 5, 185–196 (2008)

    Article  Google Scholar 

  7. Maiwald, E.: Network Security: A Beginner’s Guide, vol. 2. McGraw-Hill/Osborne, USA (2003)

    Google Scholar 

  8. Oh, S.-Y., Ghose, S., Jang, H.-J., Chung, K.: Recent trends in mobile communication systems. J. Comput. Virol. Hacking Tech. 10(2), 67–70 (2014)

    Article  Google Scholar 

  9. Sim, S.-H., Baek, S.-J.: A study on scalable information matching system based on Web service information. J. Comput. Virol. Hacking Tech. 10(2), 81–88 (2014)

    Article  Google Scholar 

Download references

Acknowledgments

This research is supported by 2014 Baekseok University research fund.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sunghyuck Hong.

Additional information

Special Issue: Convergence Security Systems.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hong, S. Efficient and secure DNS cyber shelter on DDoS attacks. J Comput Virol Hack Tech 11, 129–136 (2015). https://doi.org/10.1007/s11416-014-0230-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11416-014-0230-y

Keywords

Navigation