Eighth International Conference on Digital Information Management (ICDIM 2013) 2013
DOI: 10.1109/icdim.2013.6694018
|View full text |Cite
|
Sign up to set email alerts
|

Secure DNS from amplification attack by using modified bloom filters

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Kumbourakis et.al in his article [21] have devised a mechanism that operates on individual-centric mapping phenomenon that mainly works on the request-response scenario of the DNS query wherein the context of the DNS amplification there be an absence of such kind of querying procedure. Weizhang et.al [22] in the context of detecting the anomaly has made use of the data mining based approaches that classify the traffic of the DNS query. UzmaSattar et.al [23] have developed a modified bloom filter based mechanism such that his research study that demonstrates the process in which the filter stores the request generated to the server such that if the response from the server is delivered in specific time period then it allows that particular IP address else the IP address is blocked.…”
Section: Detection and Prediction Of Volumetric Attacksmentioning
confidence: 99%
“…Kumbourakis et.al in his article [21] have devised a mechanism that operates on individual-centric mapping phenomenon that mainly works on the request-response scenario of the DNS query wherein the context of the DNS amplification there be an absence of such kind of querying procedure. Weizhang et.al [22] in the context of detecting the anomaly has made use of the data mining based approaches that classify the traffic of the DNS query. UzmaSattar et.al [23] have developed a modified bloom filter based mechanism such that his research study that demonstrates the process in which the filter stores the request generated to the server such that if the response from the server is delivered in specific time period then it allows that particular IP address else the IP address is blocked.…”
Section: Detection and Prediction Of Volumetric Attacksmentioning
confidence: 99%
“…• Black lists. The Bloom filter is used to store a black list to prevent threats such as DDoS attack [27] and amplification attack [33]. However, when an IP address is queried, even if the IP address is legal, the result might be a false positive and the IP address is regarded it as malicious.…”
Section: Introductionmentioning
confidence: 99%