Spoofing Attacks of Domain Name System Internet

نویسندگان

  • Simar Preet Singh
  • A Raman Maini
چکیده

The Domain Name System (DNS) is a hierarchical naming system that is built on a distributed database for computers, services, or any other resource connected to the Internet or a private network. It translates the domain names meaningful to humans into the numerical identifiers associated with the networking equipment for the purpose of locating and addressing these devices worldwide [1]. The job of a DNS is to convert the human readable addresses entered on the address bar of the browser into machine readable IP addresses. DNS spoofing is a term that refers to the action of answering a DNS request that was intended for another server (a ―real‖ DNS server). This arrangement can be in a serverserver exchange (a DNS server asks another for a mapping) or in a client-server dialog (when a client asks a DNS server for a mapping). In the last many years, several security flaws have been discovered in the protocol and its specific implementations. This research paper gives an overview over the different threats to the DNS and their attack targets. We have discussed the various DNS Spoofing Attacks without IP Spoofing and DNS Spoofing Attacks with IP Spoofing and discuss their success chances and possible countermeasures. Finally, as a case study, DNS spoofing attack model is constructed and the availability of the attacked system is evaluated. The proposed approach can be used for other kinds of attacks and other types of systems, networks and applications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bootstrapping Accountability in the Internet We Have

Lack of accountability makes the Internet vulnerable to numerous attacks, including prefix hijacking, route forgery, source address spoofing, and DoS flooding attacks. This paper aims to bring accountability to the Internet with low-cost and deployable enhancements. We present IPA, a design that uses the readily available toplevel DNSSEC infrastructure and BGP to bootstrap accountability. We sh...

متن کامل

Development of DNS security, attacks and countermeasures

We use the Internet every day. The Internet relies in its very foundations on DNS, the Domain Name System. What most people don’t know is how fragile DNS actually is. This paper discusses the shortcomings of DNS, and how it is being secured. We explain common attacks, such as cache poisoning and DNS forgery. Then we mention some incidents briefly, before moving on the improvements. The improvem...

متن کامل

Spoofing Attacks Of Domain Name System

The Domain Name System (DNS) is a hierarchical naming system that is built on a distributed database for computers, services, or any other resource connected to the Internet or a private network. It translates the domain names meaningful to humans into the numerical identifiers associated with the networking equipment for the purpose of locating and addressing these devices worldwide[1]. The jo...

متن کامل

The Spoofer Project: Inferring the Extent of Source Address Filtering on the Internet

Forging, or ”spoofing,” the source addresses of IP packets provides malicious parties with anonymity and novel attack vectors. Spoofing-based attacks complicate network operator’s defense techniques; tracing spoofing remains a difficult and largely manual process. More sophisticated next generation distributed denial of service (DDoS) attacks may test filtering policies and adaptively attempt t...

متن کامل

Fragmentation Considered Poisonous

We present practical poisoning and name-server blocking attacks on standard DNS resolvers, by off-path, spoofing adversaries. Our attacks exploit large DNS responses that cause IP fragmentation; such long responses are increasingly common, mainly due to the use of DNSSEC. In common scenarios, where DNSSEC is partially or incorrectly deployed, our poisoning attacks allow ‘complete’ domain hijack...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012