DNSSEC for cyber forensics

被引:1
作者
Shulman, Haya [1 ]
Waidner, Michael [1 ,2 ]
机构
[1] Tech Univ Darmstadt, Fachbereich Informat, Mornewegstr 32, Darmstadt, DE, Germany
[2] Fraunhofer Inst Secure Informat Technol, Darmstadt, DE, Germany
来源
EURASIP JOURNAL ON INFORMATION SECURITY | 2014年 / 01期
关键词
DNS cache poisoning; Domain hijacking; Cyber attacks; Cyber security;
D O I
10.1186/s13635-014-0016-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Domain Name System (DNS) cache poisoning is a stepping stone towards advanced (cyber) attacks. DNS cache poisoning can be used to monitor users' activities for censorship, to distribute malware and spam and to subvert correctness and availability of Internet clients and services. Currently, the DNS infrastructure relies on challenge-response defences against attacks by (the common) off-path adversaries. Such defences do not suffice against stronger, man-in-the-middle (MitM), adversaries. However, MitM is not believed to be common; hence, there seems to be little motivation to adopt systematic, cryptographic mechanisms. We show that challenge-response do not protect against cache poisoning. In particular, we review common situations where (1) attackers can frequently obtain MitM capabilities and (2) even weaker attackers can subvert DNS security. We also experimentally study dependencies in the DNS infrastructure, in particular, dependencies within domain registrars and within domains, and show that multiple dependencies result in more vulnerable DNS. We review domain name system security extensions (DNSSEC), the defence against DNS cache poisoning, and argue that not only it is the most suitable mechanism for preventing cache poisoning but it is also the only proposed defence that enables a posteriori forensic analysis of attacks.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 24 条
  • [1] A study of prefix hijacking and interception in the Internet
    Ballani, Hitesh
    Francis, Paul
    Zhang, Xinyang
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2007, 37 (04) : 265 - 276
  • [2] Bernstein D. J, 2010, DNSCURVE USABLE SECU
  • [3] Bode K, 2013, SOMEBODY IS HIJACKIN
  • [4] Denis F, 2013, THE GOOGLE RW HIJACK
  • [5] Eastlake D., 2014, DOMAIN NAME SYSTEM D
  • [6] Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure
    Forth-Ics, Spiros Antonatos
    Akritidis, Periklis
    Lam, Vinh The
    Anagnostakis, Kostas G.
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 12 (02)
  • [7] Gersch J, 2013, COMP COMM NETW ICCCN, P1
  • [8] Herzberg Amir, 2013, 2013 International Conference on Availability, Reliability and Security (ARES), P398, DOI 10.1109/ARES.2013.53
  • [9] Herzberg Amir, 2012, Computer Security - ESORICS 2012. Proceedings 17th European Symposium on Research in Computer Security, P271, DOI 10.1007/978-3-642-33167-1_16
  • [10] Herzberg A, 2013, C COMM NETW SEC CNS