Page 59 - Read Online
P. 59

Page 52                                                               Kim et al. J Surveill Secur Saf 2020;1:34-60  I  http://dx.doi.org/10.20517/jsss.2020.14

               (4) Hidden Attack: These attacks abuse DNS servers to hide their attack location or attack message. The
               attacker tries to conceal the location of C&C servers or to exfiltrate the botnet command from C&C, using
               a vulnerability in internal DNS.


               5. MITIGATION
               Although DNS has suffered from many attacks, researchers’ efforts to mitigate these attacks are ongoing. In
               particular, DNSSEC, which is the product of their efforts, has helped ensure the integrity of the unreliable
               DNS data as the main vulnerability of DNS. Additionally, various advanced methods have been introduced
               to overcome a number of limitations. This section briefly describes them.

               5.1 DNSSEC and redundant DNS
               Common DNS attacks, such as cache poisoning and spoofing attacks, occur easily by forging DNS data
               and disguising fake DNS queries. Designed to overcome these problems, DNSSEC uses digital signatures
               to authenticate the contents of DNS responses, preventing the use of forged DNS data and enhancing the
               reliability of DNS queries.

                                                                                                        [8]
               As discussed in Section III, DNSSEC suffers from technical complexity, overhead, and low deployment .
                          [53]
               In 2018, NS1  has developed DNSSEC guidelines, so that DNSSEC can be configured correctly and used
               more easily. However, this does not solve all DNS security issues, including vulnerability to DDoS attacks.
               The additional length of DNSSEC responses exacerbates the problems of reflection and amplification (DDoS
               attacks). This dilemma is a major challenge for DSSEC to address in the future.

               Redundant DNS servers are one solution to attacks on availability. The DNS standard specified that up to
                                                        [54]
               eight spare servers may be used for redundancy , so that if a server is unreliable or unavailable, another
               server can provide name lookup for the user . However, these settings are rarely used in practice by
                                                       [55]
                                [56]
               enterprises and ISPs , although redundancy has been recommended for a long time.
                          [57]
               Ansari et al.  introduced a new technique to overcome the limitation of DNSSEC and reinforce DNS
               security, based on using Cloud services for availability and reliability. The redundancy, flexibility, and
               managed nature of the cloud make it a promising solution for DNS security.


               5.2 Existing DNS mitigation systems
               A number of approaches for securing DNS have been proposed. We describe these systems by grouping
               them into three categories: Monitoring and Detection Systems, security extensions on DNS records, and
               Advanced DNS with additional security functions.


               5.2.1 Monitoring and detection systems
               DNS is vulnerable to the threat of counterfeited data. One approach is to detect and monitor forged data to
               distinguish reliable DNS data. The following systems are representative DNS defense systems that include
               these functions.

                               [58]
               (1) Kopis System : Independently detects malware-related domains at the higher levels of the DNS
               hierarchy (e.g., TLD level) by monitoring network traffic at a high level of the DNS hierarchy. In particular,
               the Kopis System analyzes the streams of DNS queries and responses at authoritative name servers. From
               the monitored DNS traffic, they extract the statistical features such as the diversity in the network locations
               and the reputation of the IP space into which the domain name resolves. Kopis can predict malware-related
               domains based on monitored traffic patterns with a statistical classification which is determined from
                                                                                                        [59]
               higher DNS levels’ information. This feature is different from existing detection systems such as Notos
               (see below) or Exposure . Even without current IP reputation information, Kopis can accurately detect
                                    [60]
   54   55   56   57   58   59   60   61   62   63   64