DocumentCode :
3753129
Title :
A Revisit of DNS Kaminsky Cache Poisoning Attacks
Author :
Zheng Wang
Author_Institution :
Qingdao Univ., Qingdao, China
fYear :
2015
Firstpage :
1
Lastpage :
6
Abstract :
Kaminsky cache poisoning is arguably the most prominent and dangerous attack to DNS especially when DNSSEC is still on its way to global deployment. This paper investigates the choice space of Kaminsky cache poisoning attackers. Based on the maximum-efficiency attack model, critical parameters as well as their impacts on cache poisoning are thoroughly studied. In theory, Kaminsky cache poisoning attackers can tune those parameters in favor of an optimized success rate. In practice, the implementing schemes of optimizing cache poisoning are studied. Finally, defensive measures against Kaminsky cache poisoning are proposed.
Keywords :
"Servers","Computer crime","Aggregates","Analytical models","Internet","Entropy"
Publisher :
ieee
Conference_Titel :
Global Communications Conference (GLOBECOM), 2015 IEEE
Type :
conf
DOI :
10.1109/GLOCOM.2015.7417017
Filename :
7417017
Link To Document :
بازگشت