• DocumentCode
    2860427
  • Title

    Prevent DNS Cache Poisoning Using Security Proxy

  • Author

    Fan, Lejun ; Wang, Yuanzhuo ; Cheng, Xueqi ; Li, Jinming

  • Author_Institution
    Inst. of Comput. Technol., Beijing, China
  • fYear
    2011
  • fDate
    20-22 Oct. 2011
  • Firstpage
    387
  • Lastpage
    393
  • Abstract
    DNS has been suffering from cache poisoning attack for a long time. The attacker sends camouflaged DNS response to trick the domain name server, and inserts malicious resource record into the cached database. Because the original DNS protocol only depends on 16-bit transaction ID to verify the response packet, it is prone to be guessed by the attacker. Although many strategies such as transaction randomizing, source port randomizing and the 0×20 technique have been applied to improve the resistance of DNS, the attacker still has chance to poison DNS server in an acceptable time. Other more complicated strategy such as DNSSEC which provides stricter prevention mechanism is not easy to deploy and is not widely adopted yet. To address the problem, we present a novel strategy called Security Proxy. The architecture can be easily implemented and deployed on existing DNS server without modification of DNS server itself. The embedded two schemes Selective Re-Query and Security Label Communication can cooperate and effectively prevent the cache poisoning attack. We analyze our strategy from both the capability and efficiency. Then we find that our Security Proxy has obvious advantage over the original transaction ID, the source port randomizing and 0×20 techniques.
  • Keywords
    Internet; cache storage; computer network security; cryptographic protocols; network servers; transaction processing; 0x20 technique; 16-bit transaction ID; DNS cache poisoning attack prevention; DNS protocol; DNSSEC; camouflaged DNS response; domain name server; malicious resource; response packet verification; security label communication schemes; security proxy; selective requery schemes; source port randomization; transaction randomization; Bandwidth; Computer crime; IP networks; Servers; Switches; Toxicology; DNS Cache Poisoning attack; Security Label Communication; Security Proxy; Selective Re-Query;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Parallel and Distributed Computing, Applications and Technologies (PDCAT), 2011 12th International Conference on
  • Conference_Location
    Gwangju
  • Print_ISBN
    978-1-4577-1807-6
  • Type

    conf

  • DOI
    10.1109/PDCAT.2011.69
  • Filename
    6118551