IQ Research Journal-Open Access-ISSN:2790-4296

Mitigating DNS Amplification Attacks at the DNS Server: using BGP AS Paths and Ingress Filtering

PAPER DETAILS

CITE THIS

Authors: Christian Bassey, Francis Jeremiah, Rustem Iuzlibaev, Opeyemi Oloruntola, Success Imakuh. Paper Title: Mitigating DNS Amplification Attacks at the DNS Server: using BGP AS Paths and Ingress Filtering

IQ Research Journal of IQ res. j. (2024)3(6): pp 01-06. Vol. 003, Issue 006, 06-2024, pp. 001-006

Received: 03 06, 2024; Accepted: 23 06, 2024; Published: 25 06, 2024

ABSTRACT

These days, quite a large number of application servers are being considered to be easily spoofed. Even though technologies like DNSSec, DNS over HTTPS/TLS, and DNSCurve have always been suitable for this type of problem, many developers need help to exercise the complete chain of trust.
Implementing the mentioned protocols might be a matter of time, inexperience, or impossibility. In this paper, some workarounds that rely on BGP Autonomous System numbers (AS) are shown, and protocols therein are described by way of Unicast Reverse Path Forwarding (uRPF), its benefits and
drawbacks from an analytical standpoint, as well as the primary flow to defend end systems, are presented. Our approach focuses on filtering malicious traffic closer to the source by identifying anomalies in BGP AS path information. The methodology is implemented and tested using Snort as an Intrusion Detection System (IDS) to capture and analyze DNS request patterns, then MikroTik
router configurations are used for strict uRPF and ingress filtering, demonstrating the practical application of this solution proposed solution in real-world network environments.

Keywords: BGP, security, spoofing, DNS, DDoS, ingress filtering, uRPF, network security, autonomous systems.

RELATED PAPERS