Abstract
The Domain Name Server (DNS) is a key part of the Internet infrastructure. But DNS protocol is so simple that DNS interaction is quite vulnerable to a kind of man-in-the-middle spoofing attack. This paper introduces one type of defense technique based on the main features of DNS response packets. The technique employs Artificial Neural Networks (ANN), which produces excellent performance.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Nayak, I.N., Samaddar, S.G.: Different Flavours of Man-In-The-Middle Attack, Consequences and Feasible Solutions. In: 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), pp. 491–495. IEEE Press, Chengdu (2010)
Janbeglou, M., Zamani, M., Ibrahim, S.: Redirecting Network Traffic toward a Faked DNS Server on a LAN. In: 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), pp. 429–433. IEEE Press, Chengdu (2010)
Yan, B., Fang, B., Li, B., Wang, Y.: Detection and Defence of DNS Spoofing Attack. J. Computer Engineering 32(21), 130–135 (2006)
Men & Mice. Single Point of Failure Research (2001), http://www.menandmice.com/6000/6300_single_point_failure.html
Mitchell, T.M.: Machine Learning. McGraw-Hill Science/Engineering/Math, New York (1997)
Stevens, W.R., Wright, G.R.: TCP/IP Illustrated. The Protocols, vol. 1. Addison-Wesley Professional, Reading (1994)
Callegati, F., Cerroni, W., Ramilli, M.: Man-in-the-Middle Attack to the HTTPS Protocol. J. Security & Privacy 7, 78–81 (2009)
US Federal Bureau of Investigation Nat’l Press Office: Web “Spoofing” Scams Are a Growing Problem, press release, July 22 (2003), www.fbi.gov/pressrel/pressrel03/spoofing072103.htm
Mockapetris, P.: Domain names—Concepts and facilities. RFC 1034 (November 1987)
Mockapetris, P.V.: Domain names—Implementation and specification. RFC 1035 (November 1987)
Mockapetris, P., Dunlap, K.: Development of the domain name system. In: Proc. ACM SIGCOMM, Stanford, CA, pp. 123–133 (1988)
Arpspoof a arp poisoning tool (2010), http://monkey.org/~dugsong/dsniff/
Stallings, W.: Data and Computer Communications. Pearson Education, Inc., Upper Saddle River (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bai, X., Hu, L., Song, Z., Chen, F., Zhao, K. (2011). Defense against DNS Man-In-The-Middle Spoofing. In: Gong, Z., Luo, X., Chen, J., Lei, J., Wang, F.L. (eds) Web Information Systems and Mining. WISM 2011. Lecture Notes in Computer Science, vol 6987. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23971-7_39
Download citation
DOI: https://doi.org/10.1007/978-3-642-23971-7_39
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23970-0
Online ISBN: 978-3-642-23971-7
eBook Packages: Computer ScienceComputer Science (R0)