Spoofing Attacks Of Domain Name System

نویسندگان

  • Preet Singh
  • Raman Maini
چکیده

The Domain Name System (DNS) is a hierarchical naming system that is built on a distributed database for computers, services, or any other resource connected to the Internet or a private network. It translates the domain names meaningful to humans into the numerical identifiers associated with the networking equipment for the purpose of locating and addressing these devices worldwide[1]. The job of a DNS is to convert the human readable addresses entered on the address bar of the browser into machine readable IP addresses. DNS spoofing is a term that refers to the action of answering a DNS request that was intended for another server (a ?real? DNS server). This arrangement can be in a server-server exchange (a DNS server asks

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Spoofing Attacks of Domain Name System Internet

The Domain Name System (DNS) is a hierarchical naming system that is built on a distributed database for computers, services, or any other resource connected to the Internet or a private network. It translates the domain names meaningful to humans into the numerical identifiers associated with the networking equipment for the purpose of locating and addressing these devices worldwide [1]. The j...

متن کامل

Fragmentation Considered Poisonous

We present practical poisoning and name-server blocking attacks on standard DNS resolvers, by off-path, spoofing adversaries. Our attacks exploit large DNS responses that cause IP fragmentation; such long responses are increasingly common, mainly due to the use of DNSSEC. In common scenarios, where DNSSEC is partially or incorrectly deployed, our poisoning attacks allow ‘complete’ domain hijack...

متن کامل

Delay Spoofing Reduction in GPS Navigation System based on Time and Transform Domain Adaptive Filtering

Due to widespread use of Global Positioning System (GPS) in different applications, the issue of GPS signal interference cancelation is becoming an increasing concern. One of the most important intentional interferences is spoofing signals. An effective interference (delay spoof) reduction method based on adaptive filtering is developed in this paper. The principle of method is using adaptive f...

متن کامل

Improving Cross Ambiguity Function Using Image Processing Approach to Detect GPS Spoofing Attacks

The Global Positioning System (GPS) is vulnerable to various deliberate and unintentional interferences. Therefore, identifying and coping with various interferences in this system is essential. This paper analyzes a method of reducing the dimensions of Cross Ambiguity Function (CAF) images in improving the identification of spoofing interference at the GPS using Multi-Layer Perceptron Neural N...

متن کامل

Bootstrapping Accountability in the Internet We Have

Lack of accountability makes the Internet vulnerable to numerous attacks, including prefix hijacking, route forgery, source address spoofing, and DoS flooding attacks. This paper aims to bring accountability to the Internet with low-cost and deployable enhancements. We present IPA, a design that uses the readily available toplevel DNSSEC infrastructure and BGP to bootstrap accountability. We sh...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017