Efficient authentication mechanism for defending against reflection-based attacks on domain name system
Domain Name System (DNS) is one of few services on the Internet which is allowed through every security barrier. It mostly depends on the User Datagram Protocol (UDP) as the transport protocol, which is a connectionless protocol with no built-in authentication mechanism. On top of that, DNS response...
| Main Authors: | Hasan, Dana, Hama Amin, Rebeen R., Hussin, Masnida |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Sulaimani Polytechnic University
2020
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/88752/ http://psasir.upm.edu.my/id/eprint/88752/1/DNS.pdf |
Similar Items
Detection of denial of service attacks against domain name system using neural networks
by: Rastegari, Samaneh, et al.
Published: (2009)
by: Rastegari, Samaneh, et al.
Published: (2009)
Detection of Denial of Service Attacks against Domain Name System Using Neural Networks
by: Rastegari, Samaneh
Published: (2009)
by: Rastegari, Samaneh
Published: (2009)
Distributed defense scheme for managing DNS reflection attack in network communication systems
by: Ahmed, Dana Hasan, et al.
Published: (2016)
by: Ahmed, Dana Hasan, et al.
Published: (2016)
Defending Servers Against Naptha Attack By Using An Early Client Authentication Method [TK5105.585. C518 2008 f rb].
by: Cheng, Han Pin
Published: (2008)
by: Cheng, Han Pin
Published: (2008)
Effective way to defend the hypervisor attacks in cloud computing
by: Muhammad Shahid, Dildar, et al.
Published: (2017)
by: Muhammad Shahid, Dildar, et al.
Published: (2017)
Effective amplification mitigation and spoofing detection during DNS flooding attacks on internet
by: Hasan, Dana, et al.
Published: (2017)
by: Hasan, Dana, et al.
Published: (2017)
Protecting DNS from reflection amplification attacks using distributed defense scheme
by: Ahmed, Dana Hasan
Published: (2017)
by: Ahmed, Dana Hasan
Published: (2017)
Defending Malicious Script Attacks Using Machine
Learning Classifiers
by: Nayeem, Khan, et al.
Published: (2017)
by: Nayeem, Khan, et al.
Published: (2017)
Defending against wireless network intrusion
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
Authentic assessment for affective domain through student participant in community services
by: Masnida Hussin,, et al.
Published: (2021)
by: Masnida Hussin,, et al.
Published: (2021)
Robustness of frequency domain image watermarking against image processing attacks
by: Chai, Jee Sing
Published: (2008)
by: Chai, Jee Sing
Published: (2008)
Domain name and site hosting preferences: empirical evidence
by: O’Daniel, Thomas, et al.
Published: (2000)
by: O’Daniel, Thomas, et al.
Published: (2000)
Defending Our Chart And Compass
by: Sunday Star, Martin Vebgadesan
Published: (2008)
by: Sunday Star, Martin Vebgadesan
Published: (2008)
Defend our men in blue
by: Abd Razak, Dzulkifli
Published: (2006)
by: Abd Razak, Dzulkifli
Published: (2006)
Efficient load balancing for bursty demand in web based application services via domain name services
by: Mei, Lu Chin, et al.
Published: (2010)
by: Mei, Lu Chin, et al.
Published: (2010)
An accuracy of attack detection using attack recognition technique in multi-factor authentication scheme
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2019)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2019)
Recognition based authentication method to prevent reconstruction attack
by: Koay, Chong Jen
Published: (2018)
by: Koay, Chong Jen
Published: (2018)
Defending the French language: an online battle?
by: Humphries, Emma
Published: (2017)
by: Humphries, Emma
Published: (2017)
Protecting environmental defenders to prevent pandemics
by: Aruta, John Jamir Benzon R *, et al.
Published: (2022)
by: Aruta, John Jamir Benzon R *, et al.
Published: (2022)
Performance evaluation of an adaptive forwarding strategy in Named Data Networking
by: Raja Mahmood, Raja Azlina, et al.
Published: (2019)
by: Raja Mahmood, Raja Azlina, et al.
Published: (2019)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
by: Ismail, Haqi Khalid
Published: (2021)
by: Ismail, Haqi Khalid
Published: (2021)
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN)
by: Hussain, Muhammad Zunnurain, et al.
Published: (2024)
by: Hussain, Muhammad Zunnurain, et al.
Published: (2024)
The Military's Institutional Teleology: Defending the Common Good
by: Ford, Shannon
Published: (2016)
by: Ford, Shannon
Published: (2016)
The Military's Institutional Teleology: Defending the Common Good
by: Ford, Shannon
Published: (2016)
by: Ford, Shannon
Published: (2016)
Al- Ghazālī’s approach in defending the Islamic faith
by: Abdull Rahman Mahmood,, et al.
Published: (2022)
by: Abdull Rahman Mahmood,, et al.
Published: (2022)
UPM defends paper on Malay maritime history
by: Lee, Benjamin
Published: (2024)
by: Lee, Benjamin
Published: (2024)
Video authentication in HEVC compressed domain / Tew Yiqi
by: Tew, Yiqi
Published: (2016)
by: Tew, Yiqi
Published: (2016)
A survey on privacy-preserving authentication schemes in VANETs: attacks, challenges and open issues
by: Ahmed Jan, Sagheer, et al.
Published: (2021)
by: Ahmed Jan, Sagheer, et al.
Published: (2021)
Attacks on Shen et. al.’s remote user authentication scheme and defense*
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Defending the Lives of Others: A Duty to Forcefully Intervene?
by: Ford, Shannon
Published: (2025)
by: Ford, Shannon
Published: (2025)
Combating crimes in cyberspace and defending the cybercriminals: the malaysian perspective
by: Mohamed, Duryana
Published: (2009)
by: Mohamed, Duryana
Published: (2009)
Malaysias independence must be defended and aid Palestine liberation
by: Ahmad Irfan, Ikmal Hisham
Published: (2022)
by: Ahmad Irfan, Ikmal Hisham
Published: (2022)
Early defenders of women’s intellectual rights: Wollstonecraft’s and Rokeya’s strategies to promote female education
by: Hasan, Md. Mahmudul
Published: (2018)
by: Hasan, Md. Mahmudul
Published: (2018)
Framework for Domain Name System Security Extensions (DNSSEC) to support the IPv6 infrastructure
by: Mantoro, Teddy, et al.
Published: (2012)
by: Mantoro, Teddy, et al.
Published: (2012)
An implementation on domain name system security extensions framework for the support of IPv6 environment
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
Writing against history, in the Novel Without a Name and The Disappeared
by: Jabarouti, Roya, et al.
Published: (2014)
by: Jabarouti, Roya, et al.
Published: (2014)
Shells of coconut and their durability against termite attack
by: Manuel, Daß, et al.
Published: (2015)
by: Manuel, Daß, et al.
Published: (2015)
Defense against adversarial attack in image recognition
by: Ng, Shi Qi
Published: (2024)
by: Ng, Shi Qi
Published: (2024)
On discrete event simulation of time-variance defense mechanism against low-rate denial of service
by: Hussin, Masnida, et al.
Published: (2015)
by: Hussin, Masnida, et al.
Published: (2015)
Similar Items
-
Detection of denial of service attacks against domain name system using neural networks
by: Rastegari, Samaneh, et al.
Published: (2009) -
Detection of Denial of Service Attacks against Domain Name System Using Neural Networks
by: Rastegari, Samaneh
Published: (2009) -
Distributed defense scheme for managing DNS reflection attack in network communication systems
by: Ahmed, Dana Hasan, et al.
Published: (2016) -
Defending Servers Against Naptha Attack By Using An Early Client Authentication Method [TK5105.585. C518 2008 f rb].
by: Cheng, Han Pin
Published: (2008) -
Effective way to defend the hypervisor attacks in cloud computing
by: Muhammad Shahid, Dildar, et al.
Published: (2017)