Designing Reliable and Efficient Networks and Network Devices
In our new research, we present a severe complexity attack on DNS resolvers, where a single malicious query to a DNS resolver can significantly increase its CPU load. As a result of our research work, three common vulnerabilities and exposures (CVEs) were issued by BIND9, Unbound, and Knot resolver implementations.
https://nvd.nist.gov/vuln/detail/CVE-2022-2795, https://nvd.nist.gov/vuln/detail/CVE-2022-3204, https://nvd.nist.gov/vuln/detail/CVE-2022-40188
More details soon.
Join Red Hat Research for the next Research Days event, “Cloud Auto-scaling Mechanism Under DDoS Attacks: Yo-Yo Attack and Tandem Attack” on March 15, 2023 from 11AM to 12:30PM EST (4PM CET, 5PM IST). Anat Bremler-Barr, Tel Aviv University, and Michael Czeizler, Reichman University, will be our speakers and Jeremey Eder, Red Hat, will lead the conversation.
Daniel’s talk is about his research on Kubernetes service selection, a challenging and practical problem.
This research is part of his master thesis.