DNS Rebinding Threat Modeling and Security Analysis for Local Area Network of Maritime Transportation Systems

被引:11
作者
He, Xudong [1 ]
Wang, Jian [1 ]
Liu, Jiqiang [1 ]
Ding, Weiping [1 ,2 ]
Han, Zhen [1 ]
Wang, Bin [3 ]
Nebhen, Jamel [4 ]
Wang, Wei [1 ]
机构
[1] Beijing Jiaotong Univ, Beijing Key Lab Secur & Privacy Intelligent Transp, Beijing 100044, Peoples R China
[2] Nantong Univ, Sch Comp Sci & Technol, Nantong 226019, Peoples R China
[3] Zhejiang Univ, Coll Elect Engn, Hangzhou 310058, Peoples R China
[4] Prince Sattam Bin Abdulaziz Univ, Coll Comp Engn & Sci, Al Kharj 11942, Saudi Arabia
关键词
Computer crime; Marine vehicles; Security; Local area networks; Internet of Things; Servers; Sensors; IoT; DNS rebinding; maritime transportation; TTL; threat detection; PERFORMANCE; ATTACKS; ENERGY; APPS; WEB;
D O I
10.1109/TITS.2021.3135197
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Maritime ships and ports have become increasingly digital and intelligent. While intelligent maritime transportation systems bring convenience to the maritime industry, ship operation and management are also confronted with network risks. The Internet of Things (IoT) installed in the shipborne network collects and monitors the environmental data of the whole ship. It uses the collected data to make decisions to control the ship. The threat of Local Area Network (LAN) of IoT in ships has become an emerging issue. The DNS rebinding attack is a typical attack, which can bypass firewalls and seriously threaten the marine network in security and privacy of the local IoT. DNS rebinding attacks are difficult to model and detect, due to their sophisticated characteristics. In this work, we define threat models of DNS rebinding attacks and propose an effective method for the detection of and the defense against these attacks. First, we define threat models for DNS rebinding attacks. We employ a Markov chain to model the process of DNS rebinding attacks. With the threat modeling, the attack behaviors are clearly characterized and the most relevant attributes are thus extracted. Second, we propose an effective method for the detection of DNS rebinding attacks in the marine transportation system. The detection method includes the initialization method and the verification method, which manages and verifies access permission of equipment information and the service interface of the IoT in the shipborn network. Finally, we simulate the DNS rebinding attacks on the marine IoT. We analyze and test the security and the performance of the initialization method and the verification method in the simulated environment. The extensive experimental results demonstrate that the IoT in marine networks is vulnerable to DNS rebinding. Our method is effective and efficient to detect and defend against DNS rebinding attacks. It thus secures security and privacy in the local IoT on shipboard.
引用
收藏
页码:2643 / 2655
页数:13
相关论文
共 60 条
[1]   Web-based Attacks to Discover and Control Local IoT Devices [J].
Acar, Gunes ;
Huang, Danny Yuxing ;
Li, Frank ;
Narayanan, Arvind ;
Feamster, Nick .
PROCEEDINGS OF THE 2018 WORKSHOP ON IOT SECURITY AND PRIVACY (IOT S&P '18), 2018, :29-35
[2]  
Afek Y, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P631
[3]   Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting Referral [J].
Alowaisheq, Eihal ;
Tang, Siyuan ;
Wang, Zhihao ;
Alharbi, Fatemah ;
Liao, Xiaojing ;
Wang, XiaoFeng .
CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, :1307-1322
[4]  
[Anonymous], 2016, 2016 DYN CYB
[5]  
[Anonymous], 2012, P 2012 ACM C COMP CO
[6]  
[Anonymous], 2015, PROC INT C CIRCUITS
[7]  
Armis, 2018, DNS REB EXP HALF BIL
[8]   Internet of Ships: A Survey on Architectures, Emerging Applications, and Challenges [J].
Aslam, Sheraz ;
Michaelides, Michalis P. ;
Herodotou, Herodotos .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (10) :9714-9727
[9]   Random Access and Detection Performance of Internet of Things for Smart Ocean [J].
Bai, Lin ;
Han, Rui ;
Liu, Jianwei ;
Choi, Jinho ;
Zhang, Wei .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (10) :9858-9869
[10]   Capturing-the-Invisible (CTI): Behavior-Based Attacks Recognition in IoT-Oriented Industrial Control Systems [J].
Bhardwaj, Akashdeep ;
Al-Turjman, Fadi ;
Kumar, Manoj ;
Stephan, Thompson ;
Mostarda, Leonardo .
IEEE ACCESS, 2020, 8 :104956-104966