DocumentCode
3753129
Title
A Revisit of DNS Kaminsky Cache Poisoning Attacks
Author
Zheng Wang
Author_Institution
Qingdao Univ., Qingdao, China
fYear
2015
Firstpage
1
Lastpage
6
Abstract
Kaminsky cache poisoning is arguably the most prominent and dangerous attack to DNS especially when DNSSEC is still on its way to global deployment. This paper investigates the choice space of Kaminsky cache poisoning attackers. Based on the maximum-efficiency attack model, critical parameters as well as their impacts on cache poisoning are thoroughly studied. In theory, Kaminsky cache poisoning attackers can tune those parameters in favor of an optimized success rate. In practice, the implementing schemes of optimizing cache poisoning are studied. Finally, defensive measures against Kaminsky cache poisoning are proposed.
Keywords
"Servers","Computer crime","Aggregates","Analytical models","Internet","Entropy"
Publisher
ieee
Conference_Titel
Global Communications Conference (GLOBECOM), 2015 IEEE
Type
conf
DOI
10.1109/GLOCOM.2015.7417017
Filename
7417017
Link To Document