Abstract
In this paper we analyse two such events, an attack on NS1 in May 2016, and an attack on Dyn in October 2016. We do this by analysing the change in the behaviour of the service's customers. For our analysis we leverage data from the OpenINTEL active DNS measurement system, which covers large parts of the global DNS over time. Our results show an almost immediate and statistically significant change in the behaviour of domains that use NS1 or Dyn as a DNS service provider. We observe a decline in the number of domains that exclusively use NS1 or Dyn as a managed DNS service provider, and see a shift toward risk spreading by using multiple providers. While a large managed DNS provider may be better equipped to protect against attacks, these two case studies show they are not impervious to them. This calls into question the wisdom of using a single provider for managed DNS. Our results show that spreading risk by using multiple providers is an effective countermeasure, albeit probably at a higher cost.
Original language | English |
---|---|
Title of host publication | WTMC '18 |
Subtitle of host publication | Proceedings of the 2018 Workshop on Traffic Measurements for Cybersecurity |
Place of Publication | New York, NY, USA |
Publisher | ACM Press |
Pages | 1-7 |
Number of pages | 7 |
ISBN (Electronic) | 978-1-4503-5910-8 |
DOIs | |
Publication status | Published - 2018 |
Event | ACM SIGCOMM Workshop on Traffic Measurements for Cybersecurity, WTMC 2018 - Vigado, Budapest, Hungary Duration: 20 Aug 2018 → 23 Aug 2018 https://conferences.sigcomm.org/sigcomm/2018/ |
Conference
Conference | ACM SIGCOMM Workshop on Traffic Measurements for Cybersecurity, WTMC 2018 |
---|---|
Abbreviated title | WTMC 2018 |
Country | Hungary |
City | Budapest |
Period | 20/08/18 → 23/08/18 |
Internet address |
Fingerprint
Keywords
- Customer behaviour
- DDoS attacks
- Domain Name System
- Dyn
- Economic Impact
- NS1
Cite this
}
Measuring the Impact of a Successful DDoS Attack on the Customer Behaviour of Managed DNS Service Providers. / Abhishta, Abhishta ; van Rijswijk-Deij, Roland M.; Nieuwenhuis, Lambert J.M.
WTMC '18: Proceedings of the 2018 Workshop on Traffic Measurements for Cybersecurity. New York, NY, USA : ACM Press, 2018. p. 1-7.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Academic › peer-review
TY - GEN
T1 - Measuring the Impact of a Successful DDoS Attack on the Customer Behaviour of Managed DNS Service Providers
AU - Abhishta, Abhishta
AU - van Rijswijk-Deij, Roland M.
AU - Nieuwenhuis, Lambert J.M.
PY - 2018
Y1 - 2018
N2 - Distributed Denial-of-Service (DDoS) attacks continue to pose a serious threat to the availability of Internet services. The Domain Name System (DNS) is part of the core of the Internet and a crucial factor in the successful delivery of Internet services. Because of the importance of DNS, specialist service providers have sprung up in the market, that provide managed DNS services. One of their key selling points is that they protect DNS for a domain against DDoS attacks. But what if such a service becomes the target of a DDoS attack, and that attack succeeds?In this paper we analyse two such events, an attack on NS1 in May 2016, and an attack on Dyn in October 2016. We do this by analysing the change in the behaviour of the service's customers. For our analysis we leverage data from the OpenINTEL active DNS measurement system, which covers large parts of the global DNS over time. Our results show an almost immediate and statistically significant change in the behaviour of domains that use NS1 or Dyn as a DNS service provider. We observe a decline in the number of domains that exclusively use NS1 or Dyn as a managed DNS service provider, and see a shift toward risk spreading by using multiple providers. While a large managed DNS provider may be better equipped to protect against attacks, these two case studies show they are not impervious to them. This calls into question the wisdom of using a single provider for managed DNS. Our results show that spreading risk by using multiple providers is an effective countermeasure, albeit probably at a higher cost.
AB - Distributed Denial-of-Service (DDoS) attacks continue to pose a serious threat to the availability of Internet services. The Domain Name System (DNS) is part of the core of the Internet and a crucial factor in the successful delivery of Internet services. Because of the importance of DNS, specialist service providers have sprung up in the market, that provide managed DNS services. One of their key selling points is that they protect DNS for a domain against DDoS attacks. But what if such a service becomes the target of a DDoS attack, and that attack succeeds?In this paper we analyse two such events, an attack on NS1 in May 2016, and an attack on Dyn in October 2016. We do this by analysing the change in the behaviour of the service's customers. For our analysis we leverage data from the OpenINTEL active DNS measurement system, which covers large parts of the global DNS over time. Our results show an almost immediate and statistically significant change in the behaviour of domains that use NS1 or Dyn as a DNS service provider. We observe a decline in the number of domains that exclusively use NS1 or Dyn as a managed DNS service provider, and see a shift toward risk spreading by using multiple providers. While a large managed DNS provider may be better equipped to protect against attacks, these two case studies show they are not impervious to them. This calls into question the wisdom of using a single provider for managed DNS. Our results show that spreading risk by using multiple providers is an effective countermeasure, albeit probably at a higher cost.
KW - Customer behaviour
KW - DDoS attacks
KW - Domain Name System
KW - Dyn
KW - Economic Impact
KW - NS1
U2 - 10.1145/3229598.3229599
DO - 10.1145/3229598.3229599
M3 - Conference contribution
SP - 1
EP - 7
BT - WTMC '18
PB - ACM Press
CY - New York, NY, USA
ER -