• DocumentCode
    2363009
  • Title

    Security analysis and solution for thwarting cache poisoning attacks in the Domain Name System

  • Author

    Bassil, Ramzi ; Hobeica, Roula ; Itani, Wassim ; Ghali, Cesar ; Kayssi, Ayman ; Chehab, Ali

  • Author_Institution
    Dept. of Electr. & Comput. Eng., American Univ. of Beirut, Beirut, Lebanon
  • fYear
    2012
  • fDate
    23-25 April 2012
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    The Domain Name System is a crucial part of the Internet´s infrastructure, as it provides basic information that is vital for the proper operation of the Internet. The importance of DNS has caused it to be targeted by malicious attackers who are interested in causing damage and gaining personal benefits. Thus nowadays, DNS faces many security threats such as DNS spoofing and cache poisoning attacks. This paper presents S-DNS, an efficient security solution for thwarting cache poisoning attacks in the DNS hierarchy. The contribution of the S-DNS protocol lies in: (1) decreasing the success probability of DNS spoofing and cache poisoning by preventing man-in-the-middle attacks, (2) providing a backward compatible and simple security solution with low computation and communication overheads, (3) targeting the different DNS query interaction models from iterative, recursive, and caching schemes, and (4) employing an efficient Identity-Based Encryption key management scheme that relieves the different DNS interacting entities from the burden and complexities of traditional public-key infrastructures.
  • Keywords
    Internet; cache storage; computer network security; iterative methods; probability; protocols; public key cryptography; recursive estimation; DNS hierarchy; DNS interacting entities; DNS query interaction models; DNS spoofing probability; Internet infrastructure; S-DNS protocol; cache poisoning attack thwarting; caching schemes; domain name system; identity-based encryption key management scheme; iterative schemes; malicious attackers; man-in-the-middle attacks prevention; public-key infrastructures; recursive schemes; security analysis; security solution; security threats; Computer crime; IP networks; Protocols; Public key; Servers; DNS; DNS cache poisoning; DNS security; Identity-Based Encryption; man-in-the-middle attacks; spoofing attacks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Telecommunications (ICT), 2012 19th International Conference on
  • Conference_Location
    Jounieh
  • Print_ISBN
    978-1-4673-0745-1
  • Electronic_ISBN
    978-1-4673-0746-8
  • Type

    conf

  • DOI
    10.1109/ICTEL.2012.6221233
  • Filename
    6221233