<?xml version='1.0' encoding='UTF-8'?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
  <responseDate>2026-03-11T04:41:41Z</responseDate>
  <request metadataPrefix="oai_dc" verb="GetRecord" identifier="oai:ipsj.ixsq.nii.ac.jp:00183605">https://ipsj.ixsq.nii.ac.jp/oai</request>
  <GetRecord>
    <record>
      <header>
        <identifier>oai:ipsj.ixsq.nii.ac.jp:00183605</identifier>
        <datestamp>2025-01-20T03:36:09Z</datestamp>
        <setSpec>581:8997:9007</setSpec>
      </header>
      <metadata>
        <oai_dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns="http://www.w3.org/2001/XMLSchema" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
          <dc:title>Detection and Filtering System for DNS Water Torture Attacks Relying Only on Domain Name Information</dc:title>
          <dc:title>Detection and Filtering System for DNS Water Torture Attacks Relying Only on Domain Name Information</dc:title>
          <dc:creator>Takuro, Yoshida</dc:creator>
          <dc:creator>Kento, Kawakami</dc:creator>
          <dc:creator>Ryotaro, Kobayashi</dc:creator>
          <dc:creator>Masahiko, Kato</dc:creator>
          <dc:creator>Masayuki, Okada</dc:creator>
          <dc:creator>Hiroyuki, Kishimoto</dc:creator>
          <dc:creator>Takuro, Yoshida</dc:creator>
          <dc:creator>Kento, Kawakami</dc:creator>
          <dc:creator>Ryotaro, Kobayashi</dc:creator>
          <dc:creator>Masahiko, Kato</dc:creator>
          <dc:creator>Masayuki, Okada</dc:creator>
          <dc:creator>Hiroyuki, Kishimoto</dc:creator>
          <dc:subject>[特集：高度化するサイバー攻撃に対応するコンピュータセキュリティ技術] DNS, DDoS, IPS, water torture attacks, pseudo-random subdomain attacks, naïve Bayes classifier</dc:subject>
          <dc:description>Water torture attacks are a recently emerging type of Distributed Denial-of-Service (DDoS) attack on Domain Name System (DNS) servers. They generate a multitude of malicious queries with randomized, unique subdomains. This paper proposes a detection method and a filtering system for water torture attacks. The former is an enhancement of our previous effort so as to achieve packet-by-packet, on-the-fly processing, and the latter is an application of our current method mainly for defending recursive servers. Our proposed method detects malicious queries by analyzing their subdomains with a naïve Bayes classifier. Considering large-scale applications, we focus on achieving high throughput as well as high accuracy. Experimental results indicate that our method can detect attacks with 98.16% accuracy and only a 1.55% false positive rate, and that our system can process up to 7.44Mpps of traffic.
------------------------------
This is a preprint of an article intended for publication Journal of
Information Processing(JIP). This preprint should not be cited. This
article should be cited as: Journal of Information Processing Vol.25(2017) (online)
DOI　http://dx.doi.org/10.2197/ipsjjip.25.854
------------------------------</dc:description>
          <dc:description>Water torture attacks are a recently emerging type of Distributed Denial-of-Service (DDoS) attack on Domain Name System (DNS) servers. They generate a multitude of malicious queries with randomized, unique subdomains. This paper proposes a detection method and a filtering system for water torture attacks. The former is an enhancement of our previous effort so as to achieve packet-by-packet, on-the-fly processing, and the latter is an application of our current method mainly for defending recursive servers. Our proposed method detects malicious queries by analyzing their subdomains with a naïve Bayes classifier. Considering large-scale applications, we focus on achieving high throughput as well as high accuracy. Experimental results indicate that our method can detect attacks with 98.16% accuracy and only a 1.55% false positive rate, and that our system can process up to 7.44Mpps of traffic.
------------------------------
This is a preprint of an article intended for publication Journal of
Information Processing(JIP). This preprint should not be cited. This
article should be cited as: Journal of Information Processing Vol.25(2017) (online)
DOI　http://dx.doi.org/10.2197/ipsjjip.25.854
------------------------------</dc:description>
          <dc:description>journal article</dc:description>
          <dc:date>2017-09-15</dc:date>
          <dc:format>application/pdf</dc:format>
          <dc:identifier>情報処理学会論文誌</dc:identifier>
          <dc:identifier>9</dc:identifier>
          <dc:identifier>58</dc:identifier>
          <dc:identifier>1882-7764</dc:identifier>
          <dc:identifier>AN00116647</dc:identifier>
          <dc:identifier>https://ipsj.ixsq.nii.ac.jp/record/183605/files/IPSJ-JNL5809007.pdf</dc:identifier>
          <dc:language>eng</dc:language>
        </oai_dc:dc>
      </metadata>
    </record>
  </GetRecord>
</OAI-PMH>
