[sdnog] Understanding the Origins of Anomalous Open DNS Resolvers

Nishal Goburdhan nishal at controlfreak.co.za
Wed Mar 4 18:42:14 SAST 2015

Abstract. Recent distributed denial-of-service attacks on the Internet have been exploiting necessarily open protocols, such as DNS. The Spamhaus attack is one of the largest ever examples of such attacks. Although much research has been conducted to discuss how to mitigate these threats, little has been done to understand why open resolvers exist in the first place. In particular, 60% of the open resolvers have anomalous behaviour and causes for their behavior remain a mystery, which hurts miti- gation efforts. Our research produces the first detailed investigation of the 17 million anomalous open resolvers and find that these are primarily ADSL modems made by four manufacturers. These devices behave anomalously and respond to DNS queries with the wrong source port due to improper NAT configurations and are unfortunately hard to fix without a concerted effort by ISPs and manufacturers. We also find that anomalous open resolvers are clustered, which has the potential for them to be exploited in more crippling DDoS attacks.

full paper:  http://sfc-monitor.ai3.net/~dikshie/.papers/PAM/PAM2015/15.pdf


More information about the sdnog mailing list