Title :
Formal Analysis of the Kaminsky DNS Cache-Poisoning Attack Using Probabilistic Model Checking
Author :
Alexiou, Nikolaos ; Basagiannis, Stylianos ; Katsaros, Panagiotis ; Dashpande, Tushar ; Smolka, Scott A.
Author_Institution :
Dept. of Inf., Aristotle Univ. of Thessaloniki, Thessaloniki, Greece
Abstract :
We use the probabilistic model checker PRISM to formally model and analyze the highly publicized Kaminsky DNS cache-poisoning attack. DNS (Domain Name System) is an internet-wide, hierarchical naming system used to translate domain names such as google.com into physical IP addresses such as 208.77.188.166. The Kaminsky DNS attack is a recently discovered vulnerability in DNS that allows an intruder to hijack a domain, i.e. corrupt a DNS server so that it replies with the IP address of a malicious web server when asked to resolve URLs within a non-malicious domain such as google.com. A proposed fix for the attack is based on the idea of randomizing the source port a DNS server uses when issuing a query to another server in the DNS hierarchy. We use PRISM to introduce a Continuous Time Markov Chain representation of the Kaminsky attack and the proposed fix, and to perform the required probabilistic model checking. Our results, gleaned from more than 240 PRISM runs, formally validate the existence of the Kaminsky cache-poisoning attack even in the presence of an intruder with virtually no knowledge of the victim DNS server´s actions. They also serve to quantify the effectiveness of the proposed fix: using nonlinear least-squares curve fitting, we show that the probability of a successful attack obeys a 1/N distribution, where N is the upper limit on the range of source-port ids. We also demonstrate an increasing attack probability with an increasing number of attempted attacks or increasing rate at which the intruder guesses the source-port id.
Keywords :
IP networks; Internet; Markov processes; cache storage; computer network security; curve fitting; formal verification; least squares approximations; statistical distributions; 1/N distribution; DNS server corruption; DNS vulnerability; Domain Name System; Internet-wide hierarchical naming system; Kaminsky DNS cache-poisoning attack; PRISM; continuous time Markov chain representation; domain hijacking; domain name translation; formal analysis; formal model; intruder; malicious Web server; nonlinear least-squares curve fitting; physical IP address; probabilistic model checking; source-port ID; Analytical models; Computational modeling; Computer crime; IP networks; Markov processes; Probabilistic logic; Servers; Cache Poisoning; DNS; Probabilistic Model Checking;
Conference_Titel :
High-Assurance Systems Engineering (HASE), 2010 IEEE 12th International Symposium on
Conference_Location :
San Jose, CA
Print_ISBN :
978-1-4244-9091-2
Electronic_ISBN :
1530-2059
DOI :
10.1109/HASE.2010.25