Design of security scheme to prevent DNS cache poisoning attacks
DNS is a protocol which translate domain names to IP addresses of which network devices use to communicate with each other. However, DNS has vulnerabilities open to exploitation. DNS cache poisoning attack is one of the exploited method that is still not completely mitigated till today. DNS resolve...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2017
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/70810 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Summary: | DNS is a protocol which translate domain names to IP addresses of which network devices use to communicate with each other. However, DNS has vulnerabilities open to exploitation.
DNS cache poisoning attack is one of the exploited method that is still not completely mitigated till today. DNS resolver cached on the poisoned query response of which the attackers sent. The bogus response could stay in the cache for a long period without users realizing at all.
This report studies DNS cache poisoning attacks and method to mitigate the cyber-attack. Many solutions had been proposed to improve on the security of DNS. There are two main security schemes for DNS cache poisoning attacks. One is the Dan Kaminsky’s algorithm [11] of which he uses to mitigate the attack after discovering a fundamental DNS vulnerability.
The other is DNSSEC which involves adding cryptographic signature to DNS records and stored in DNS name servers. Verification can be made if the requested DNS record comes from authoritative server. Despite having these security schemes, DNS cache poisoning attacks are still happening throughout the years. A proposed countermeasure would be included in this report, of which DNS resolver and local cache would be considered. |
---|