Skip to main content

Defense against DNS Man-In-The-Middle Spoofing

  • Conference paper
Web Information Systems and Mining (WISM 2011)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6987))

Included in the following conference series:

Abstract

The Domain Name Server (DNS) is a key part of the Internet infrastructure. But DNS protocol is so simple that DNS interaction is quite vulnerable to a kind of man-in-the-middle spoofing attack. This paper introduces one type of defense technique based on the main features of DNS response packets. The technique employs Artificial Neural Networks (ANN), which produces excellent performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Nayak, I.N., Samaddar, S.G.: Different Flavours of Man-In-The-Middle Attack, Consequences and Feasible Solutions. In: 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), pp. 491–495. IEEE Press, Chengdu (2010)

    Chapter  Google Scholar 

  2. Janbeglou, M., Zamani, M., Ibrahim, S.: Redirecting Network Traffic toward a Faked DNS Server on a LAN. In: 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), pp. 429–433. IEEE Press, Chengdu (2010)

    Chapter  Google Scholar 

  3. Yan, B., Fang, B., Li, B., Wang, Y.: Detection and Defence of DNS Spoofing Attack. J. Computer Engineering 32(21), 130–135 (2006)

    Google Scholar 

  4. Men & Mice. Single Point of Failure Research (2001), http://www.menandmice.com/6000/6300_single_point_failure.html

  5. Mitchell, T.M.: Machine Learning. McGraw-Hill Science/Engineering/Math, New York (1997)

    MATH  Google Scholar 

  6. Stevens, W.R., Wright, G.R.: TCP/IP Illustrated. The Protocols, vol. 1. Addison-Wesley Professional, Reading (1994)

    MATH  Google Scholar 

  7. Callegati, F., Cerroni, W., Ramilli, M.: Man-in-the-Middle Attack to the HTTPS Protocol. J. Security & Privacy 7, 78–81 (2009)

    Article  Google Scholar 

  8. US Federal Bureau of Investigation Nat’l Press Office: Web “Spoofing” Scams Are a Growing Problem, press release, July 22 (2003), www.fbi.gov/pressrel/pressrel03/spoofing072103.htm

  9. Mockapetris, P.: Domain names—Concepts and facilities. RFC 1034 (November 1987)

    Google Scholar 

  10. Mockapetris, P.V.: Domain names—Implementation and specification. RFC 1035 (November 1987)

    Google Scholar 

  11. Mockapetris, P., Dunlap, K.: Development of the domain name system. In: Proc. ACM SIGCOMM, Stanford, CA, pp. 123–133 (1988)

    Google Scholar 

  12. Arpspoof a arp poisoning tool (2010), http://monkey.org/~dugsong/dsniff/

  13. Stallings, W.: Data and Computer Communications. Pearson Education, Inc., Upper Saddle River (2007)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bai, X., Hu, L., Song, Z., Chen, F., Zhao, K. (2011). Defense against DNS Man-In-The-Middle Spoofing. In: Gong, Z., Luo, X., Chen, J., Lei, J., Wang, F.L. (eds) Web Information Systems and Mining. WISM 2011. Lecture Notes in Computer Science, vol 6987. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23971-7_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23971-7_39

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23970-0

  • Online ISBN: 978-3-642-23971-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics