DNS Rebinding Threat Modeling and Security Analysis for Local Area Network of Maritime Transportation Systems

被引:11
作者
He, Xudong [1 ]
Wang, Jian [1 ]
Liu, Jiqiang [1 ]
Ding, Weiping [1 ,2 ]
Han, Zhen [1 ]
Wang, Bin [3 ]
Nebhen, Jamel [4 ]
Wang, Wei [1 ]
机构
[1] Beijing Jiaotong Univ, Beijing Key Lab Secur & Privacy Intelligent Transp, Beijing 100044, Peoples R China
[2] Nantong Univ, Sch Comp Sci & Technol, Nantong 226019, Peoples R China
[3] Zhejiang Univ, Coll Elect Engn, Hangzhou 310058, Peoples R China
[4] Prince Sattam Bin Abdulaziz Univ, Coll Comp Engn & Sci, Al Kharj 11942, Saudi Arabia
关键词
Computer crime; Marine vehicles; Security; Local area networks; Internet of Things; Servers; Sensors; IoT; DNS rebinding; maritime transportation; TTL; threat detection; PERFORMANCE; ATTACKS; ENERGY; APPS; WEB;
D O I
10.1109/TITS.2021.3135197
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Maritime ships and ports have become increasingly digital and intelligent. While intelligent maritime transportation systems bring convenience to the maritime industry, ship operation and management are also confronted with network risks. The Internet of Things (IoT) installed in the shipborne network collects and monitors the environmental data of the whole ship. It uses the collected data to make decisions to control the ship. The threat of Local Area Network (LAN) of IoT in ships has become an emerging issue. The DNS rebinding attack is a typical attack, which can bypass firewalls and seriously threaten the marine network in security and privacy of the local IoT. DNS rebinding attacks are difficult to model and detect, due to their sophisticated characteristics. In this work, we define threat models of DNS rebinding attacks and propose an effective method for the detection of and the defense against these attacks. First, we define threat models for DNS rebinding attacks. We employ a Markov chain to model the process of DNS rebinding attacks. With the threat modeling, the attack behaviors are clearly characterized and the most relevant attributes are thus extracted. Second, we propose an effective method for the detection of DNS rebinding attacks in the marine transportation system. The detection method includes the initialization method and the verification method, which manages and verifies access permission of equipment information and the service interface of the IoT in the shipborn network. Finally, we simulate the DNS rebinding attacks on the marine IoT. We analyze and test the security and the performance of the initialization method and the verification method in the simulated environment. The extensive experimental results demonstrate that the IoT in marine networks is vulnerable to DNS rebinding. Our method is effective and efficient to detect and defend against DNS rebinding attacks. It thus secures security and privacy in the local IoT on shipboard.
引用
收藏
页码:2643 / 2655
页数:13
相关论文
共 60 条
[41]  
P. University, DNS ATT SCEN
[42]  
Panwar N., 2019, arXiv
[43]  
Papastergiou S., 2021, Advances in Core Computer Science-Based Technologies: Papers in Honor of Professor Nikolaos Alexandris, P129
[44]   Energy-Efficient End-to-End Security for Software-Defined Vehicular Networks [J].
Raja, Gunasekaran ;
Anbalagan, Sudha ;
Vijayaraghavan, Geetha ;
Dhanasekaran, Priyanka ;
Al-Otaibi, Yasser D. ;
Bashir, Ali Kashif .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (08) :5730-5737
[45]   Intelligent Reward-Based Data Offloading in Next-Generation Vehicular Networks [J].
Raja, Gunasekaran ;
Ganapathisubramaniyan, Aishwarya ;
Anbalagan, Sudha ;
Baskaran, Sheeba Backia Marry ;
Raja, Kathiroli ;
Bashir, Ali Kashif .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (05) :3747-3758
[46]   A Distributed and Anonymous Data Collection Framework Based on Multilevel Edge Computing Architecture [J].
Usman, Muhammad ;
Jan, Mian Ahmad ;
Jolfaei, Alireza ;
Xu, Min ;
He, Xiangjian ;
Chen, Jinjun .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (09) :6114-6123
[47]   ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts [J].
Wang, Wei ;
Song, Jingjing ;
Xu, Guangquan ;
Li, Yidong ;
Wang, Hao ;
Su, Chunhua .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02) :1133-1144
[48]   BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors [J].
Wang, Wei ;
Shang, Yaoyao ;
He, Yongzhong ;
Li, Yidong ;
Liu, Jiqiang .
INFORMATION SCIENCES, 2020, 511 :284-296
[49]   Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network [J].
Wang, Wei ;
Zhao, Mengxue ;
Wang, Jigang .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (08) :3035-3043
[50]   Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers [J].
Wang, Wei ;
Li, Yuanyuan ;
Wang, Xing ;
Liu, Jiqiang ;
Zhang, Xiangliang .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :987-994