Next-Generation Technologies & Secure Development , Video

The TsuKing Threat: New DNS Vulnerability Explained

Tsinghua University Professor Haixin Duan on the New Wave of DNS Attacks
Haixin Duan, professor, Institute for Network Sciences and Cyberspace, Tsinghua University

Domain name system or DNS attacks have persisted as a popular method for carrying out distributed denial-of-service attacks. DNS plays a crucial role in cybersecurity, mapping domain names and IP addresses and ensuring that the internet remains reliable and accessible. But DNS is susceptible to attacks.

See Also: Expel: Firms Still Threatened by Old Vulnerabilities

Haixin Duan, professor at Tsinghua University's Institute for Network Sciences and Cyberspace, described TsuKing - a new form of DNS attack that involves DNS resolvers amplifying DNS queries into a massive amount of traffic, coordinated with thousands of resolvers to cascade layers and multiply the amplification.

Unlike traditional DNS amplification attacks, TsuKing attacks don't require IP address spoofing, Duan said.

In this video interview with Information Security Media Group at Black Hat Europe 2023, Duan also discussed:

  • The issues concerning open-source DNS software;
  • Compliance with DNS standards, particularly the deployment of negative caching;
  • The evolving nature of DNS protocols, such as DNS over HTTPS and DNS over QUIC.

Duan has been working on network security for nearly 30 years. His recent research interests include network protocol security, intrusion detection, underground economy detection and internet governance.


About the Author

Tony Morbin

Tony Morbin

Executive News Editor, EU

Morbin is a veteran cybersecurity and tech journalist, editor, publisher and presenter working exclusively in cybersecurity for the past decade – at ISMG, SC Magazine and IT Sec Guru. He previously covered computing, finance, risk, electronic payments, telecoms, broadband and computing, including at the Financial Times. Morbin spent seven years as an editor in the Middle East and worked on ventures covering Hong Kong and Ukraine.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.