DNS Cache Poisoning: A Review on its Technique and Countermeasures

被引:0
|
作者
Dissanayake, I. M. M. [1 ]
机构
[1] Sri Lanka Inst Informat Technol, Fac Grad Studies & Res, Colombo 03, Sri Lanka
来源
2018 NATIONAL INFORMATION TECHNOLOGY CONFERENCE (NITC) | 2018年
关键词
DNS cache poisoning; Domain Name System; IP address; Server;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IP address is the basis of Internet server communication. Many attackers try to spoof Domain Name System using different techniques to introduce false IP addresses to client servers. Use of cache memory is the most commonly seen type, which is known as DNS cache poisoning. This attack has become a serious threat to information security at individual and organizational levels. The purpose of this article is to study Domain Name System and the mechanism of DNS cache poisoning. Further, this paper will discuss countermeasures used against DNS cache poisoning. Many scholars have presented different methods of cache poisoning and the most recent technique was introduced by Kaminsky in 2008. Many researches have been done throughout the world to invent more secure countermeasures against DNS cache poisoning and the most commonly used countermeasure is Domain Name System Security Extensions. However, there are different countermeasures against DNS cache poisoning; none of the countermeasure could certify the action against DNS cache poisoning. Hence, future researches should be oriented towards to introducing more trustworthy countermeasures against DNS cache poisoning and new identical infrastructure for internet browsing other than DNS.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Reducing DNS Cache Poisoning Attacks
    Mohan, Jayashree
    Puranik, Shruthi
    Chandrasekaran, K.
    ICACCS 2015 PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS, 2015,
  • [2] Adaptive Deterrence of DNS Cache Poisoning
    Chau, Sze Yiu
    Chowdhury, Omar
    Gonsalves, Victor
    Ge, Huangyi
    Yang, Weining
    Fahmy, Sonia
    Li, Ninghui
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT II, 2018, 255 : 171 - 191
  • [3] The Hitchhiker's Guide to DNS Cache Poisoning
    Son, Sooel
    Shmatikov, Vitaly
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, 2010, 50 : 466 - 483
  • [4] Poster: On the Capability of DNS Cache Poisoning Attacks
    Wang, Zheng
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1523 - 1525
  • [5] A Revisit of DNS Kaminsky Cache Poisoning Attacks
    Wang, Zheng
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [6] Principles and Defense Strategies of DNS Cache Poisoning
    Jin Chong
    Hao Zhiyu
    Wu Zhigang
    CHINA COMMUNICATIONS, 2009, 6 (04) : 75 - 81
  • [7] DNS Cache Poisoning Attack: Resurrections with Side Channels
    Man, Keyu
    Zhou, Xin'an
    Qian, Zhiyun
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 3400 - 3414
  • [8] DepenDNS: Dependable Mechanism against DNS Cache Poisoning
    Sun, Hung-Min
    Chang, Wen-Hsuan
    Chang, Shih-Ying
    Lin, Yue-Hsun
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 174 - 188
  • [9] Methodology for DNS Cache Poisoning Vulnerability Analysis of DNS64 Implementations
    Lencse, G.
    Kadobayashi, Y.
    INFOCOMMUNICATIONS JOURNAL, 2018, 10 (02): : 13 - 25
  • [10] Model checking the DNS under DNS cache-poisoning attacks using SPIN
    Zhang, Wei
    Yang, Meihong
    Zhang, Xinchang
    Shi, Huiling
    SCIENCEASIA, 2016, 42 : 49 - 55