DNS Rebinding Threat Modeling and Security Analysis for Local Area Network of Maritime Transportation Systems

被引:11
作者
He, Xudong [1 ]
Wang, Jian [1 ]
Liu, Jiqiang [1 ]
Ding, Weiping [1 ,2 ]
Han, Zhen [1 ]
Wang, Bin [3 ]
Nebhen, Jamel [4 ]
Wang, Wei [1 ]
机构
[1] Beijing Jiaotong Univ, Beijing Key Lab Secur & Privacy Intelligent Transp, Beijing 100044, Peoples R China
[2] Nantong Univ, Sch Comp Sci & Technol, Nantong 226019, Peoples R China
[3] Zhejiang Univ, Coll Elect Engn, Hangzhou 310058, Peoples R China
[4] Prince Sattam Bin Abdulaziz Univ, Coll Comp Engn & Sci, Al Kharj 11942, Saudi Arabia
关键词
Computer crime; Marine vehicles; Security; Local area networks; Internet of Things; Servers; Sensors; IoT; DNS rebinding; maritime transportation; TTL; threat detection; PERFORMANCE; ATTACKS; ENERGY; APPS; WEB;
D O I
10.1109/TITS.2021.3135197
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Maritime ships and ports have become increasingly digital and intelligent. While intelligent maritime transportation systems bring convenience to the maritime industry, ship operation and management are also confronted with network risks. The Internet of Things (IoT) installed in the shipborne network collects and monitors the environmental data of the whole ship. It uses the collected data to make decisions to control the ship. The threat of Local Area Network (LAN) of IoT in ships has become an emerging issue. The DNS rebinding attack is a typical attack, which can bypass firewalls and seriously threaten the marine network in security and privacy of the local IoT. DNS rebinding attacks are difficult to model and detect, due to their sophisticated characteristics. In this work, we define threat models of DNS rebinding attacks and propose an effective method for the detection of and the defense against these attacks. First, we define threat models for DNS rebinding attacks. We employ a Markov chain to model the process of DNS rebinding attacks. With the threat modeling, the attack behaviors are clearly characterized and the most relevant attributes are thus extracted. Second, we propose an effective method for the detection of DNS rebinding attacks in the marine transportation system. The detection method includes the initialization method and the verification method, which manages and verifies access permission of equipment information and the service interface of the IoT in the shipborn network. Finally, we simulate the DNS rebinding attacks on the marine IoT. We analyze and test the security and the performance of the initialization method and the verification method in the simulated environment. The extensive experimental results demonstrate that the IoT in marine networks is vulnerable to DNS rebinding. Our method is effective and efficient to detect and defend against DNS rebinding attacks. It thus secures security and privacy in the local IoT on shipboard.
引用
收藏
页码:2643 / 2655
页数:13
相关论文
共 60 条
[21]   JS']JS-SAN: defense mechanism for HTML']HTML5-based web applications against java']javascript code injection vulnerabilities [J].
Gupta, Shashank ;
Gupta, B. B. .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (11) :1477-1495
[22]  
He Xudong, 2020, Frontiers in Cyber Security: Third International Conference, FCS 2020. Communications in Computer and Information Science (1286), P19, DOI 10.1007/978-981-15-9739-8_2
[23]   Systems analysis for deployment of internet of things (IoT) in the maritime industry [J].
Hiekata, Kazuo ;
Wanaka, Shinnosuke ;
Mitsuyuki, Taiga ;
Ueno, Ryuji ;
Wada, Ryota ;
Moser, Bryan .
JOURNAL OF MARINE SCIENCE AND TECHNOLOGY, 2021, 26 (02) :459-469
[24]   A Smart Sensor Web for Ocean Observation: Fixed and Mobile Platforms, Integrated Acoustics, Satellites and Predictive Modeling [J].
Howe, Bruce M. ;
Chao, Yi ;
Arabshahi, Payman ;
Roy, Sumit ;
McGinnis, Tim ;
Gray, Andrew .
IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING, 2010, 3 (04) :507-521
[25]   Protecting Browsers from DNS Rebinding Attacks [J].
Jackson, Collin ;
Barth, Adam ;
Bortz, Andrew ;
Shao, Weidong ;
Boneh, Dan .
ACM TRANSACTIONS ON THE WEB, 2009, 3 (01)
[26]   DETECTION OF MALICIOUS DNS AND WEB SERVERS USING GRAPH-BASED APPROACHES [J].
Jia, Jinyuan ;
Dong, Zheng ;
Li, Jie ;
Stokes, Jack W. .
2021 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP 2021), 2021, :2625-2629
[27]  
Johns Martin, 2013, Proceedings of the 22nd USENIX Security Symposium. Security '13, P621
[28]  
Karlof C, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P58
[29]  
Latvala M., 2006, PROC IEEE REGION C T, P1
[30]   A Triggering Mechanism for Cyber-Attacks in Naval Sensors and Systems [J].
Leite Junior, Walmor Cristino ;
de Moraes, Claudio Coreixas ;
de Albuquerque, Carlos E. P. ;
Machado, Raphael Carlos Santos ;
de Sa, Alan Oliveira .
SENSORS, 2021, 21 (09)