A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet

被引:11
作者
Park, Jeman [1 ]
Jang, Rhongho [2 ]
Mohaisen, Manar [3 ]
Mohaisen, David [4 ]
机构
[1] Georgia Inst Technol, Sch Elect & Comp Engn, Atlanta, GA 30332 USA
[2] Wayne State Univ, Dept Comp Sci, Detroit, MI 48202 USA
[3] NE Illinois Univ, Dept Comp Sci, Chicago, IL 60625 USA
[4] Univ Cent Florida, Dept Comp Sci, Orlando, FL 32816 USA
基金
新加坡国家研究基金会;
关键词
Servers; Internet; IP networks; Computer crime; Superluminescent diodes; Security; Reliability; Open resolver; DNS; measurement; behavioral analysis;
D O I
10.1109/TNET.2021.3105599
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Open DNS resolvers are resolvers that perform recursive resolution on behalf of any user. They can be exploited by adversaries because they are open to the public and require no authorization to use. Therefore, it is important to understand the state of open resolvers to gauge their potentially negative impact on the security and stability of the Internet. In this study, we conducted a comprehensive probing over the entire IPv4 address space and found that more than 3 million IP addresses of open resolvers still exist in the wild. Moreover, we found that many of them work in a way that deviates from the standard. More importantly, we found that many open resolvers answer queries with incorrect, even malicious, responses. Contrasting to results obtained in 2013, we found that while the number of open resolvers has decreased significantly, the number of resolvers providing incorrect responses is almost the same, while the number of open resolvers providing malicious responses has increased, highlighting the prevalence of their threat. Through an extended analysis, we also empirically show that the use of forwarders in the open resolver ecosystem and the possibility that incorrect or malicious responses can be manipulated by these forwarders.
引用
收藏
页码:76 / 89
页数:14
相关论文
共 29 条
[1]  
Ager Bernhard., 2010, Proceedings ofthe 10th ACMSIGCOMM conference on Internet measurement, P15
[2]  
Antonakakis M, 2010, LECT NOTES COMPUT SC, V6307, P18, DOI 10.1007/978-3-642-15512-3_2
[3]  
Chen X., 2006, P IEEE INT C DISTR C, P40
[4]   Maintaining strong cache consistency for the domain name system [J].
Chen, Xin ;
Wang, Haining ;
Ren, Shansi ;
Zhang, Xiaodong .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2007, 19 (08) :1057-1071
[5]  
Dagon David., 2008, NDSS
[6]  
Damas J., 2013, RFC 6891
[7]  
Durumeric Zakir, 2013, Proceedings of the 22nd USENIX Security Symposium. Security '13, P605
[8]  
Eastlake D., 2013, 6895 IETF RFC
[9]  
Fukuda K, 2013, IEEE INFOCOM SER, P80
[10]   An Empirical Reexamination of Global DNS Behavior [J].
Gao, Hongyu ;
Yegneswaran, Vinod ;
Chen, Yan ;
Porras, Phillip ;
Ghosh, Shalini ;
Jiang, Jian ;
Duan, Haixin .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2013, 43 (04) :267-278