Abstract
The Domain Name System (DNS) protocol is used as a naming system for computers, services, or any other network resource. This paper presents a solution for the cache poisoning attack in which the attacker inserts incorrect data into the DNS cache. In order to successfully poison the cache, the attacker response must beat the real response in the race back to the local DNS server. In our model, we assume an eavesdropping attacker that can construct a response that is identical to the legal response. The primary aim of our solution is to construct a normal profile of the round trip time from when the request is sent until the arrival of the response, and then to search for anomalies of the constructed profile. In order to poison the cache of a DNS server, the attacker has to know the source port and the Transaction ID (TID) of the request. As far as we know, all current solutions which do not change the protocol, assume an attacker that cannot see the request and therefore has to guess the TID. All these solutions try to increase entropy in order to make the guesswork harder. In our strict model, increasing entropy is useless. We in no way claim that our scheme is flawless. Nevertheless, this effort represents the first step towards preserving the DNS cache assuming an eavesdropping attacker.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Schuba, C.: Addressing weaknesses in the domain name system protocol. Master’s thesis (August 1993)
Hyatt, R.: Keeping dns trustworthy. The ISSA Journal, 37–38 (2006)
Bernstein, D.J.: Dnscurve, http://dnscurve.org/
Sainstitute: Attacking the dns protocol security paper (2003)
Terry, D.B., Painter, M., Riggle, D.W., Zhou, S.: The berkeley internet name domain server. EECS Department, University of California, Berkeley, Tech. Rep. UCB/CSD-84-182 (May 1984), http://www.eecs.berkeley.edu/Pubs/TechRpts/1984/5957.html
Klein, A.: Bind 9 dns cache poisoning (2007)
Stewart, J.: Dns cache poisoning - the next generation (2003)
Kaminsky, D.: The kamisky bug, http://dankaminsky.com/
Internet Systems Consortium, I.: “Bind 9” (2003), http://www.bind9.net/
Powerdns (2011), http://doc.powerdns.com/
Vixie, P., Dagon, D.: Use of bit 0x20 in dns labels to improve transaction identity (2008), http://tools.ietf.org/html/draft-vixie-dnsext-dns0x20-00
Dagon, D., Antonakakis, M., Vixie, P., Jinmei, T., Lee, W.: Increased dns forgery resistance through 0x20-bit encoding: security via leet queries. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS 2008, pp. 211–222. ACM, New York (2008), http://doi.acm.org/10.1145/1455770.1455798
Perdisci, R., Antonakakis, M., Lee, W.: Solving the dns cache poisoning problem without changing the protocol (2008)
Perdisci, R., Antonakakis, M., Luo, X., Lee, W.: Wsec dns: Protecting recursive dns resolvers from poisoning attacks. In: DSN, pp. 3–12. IEEE (2009), http://dblp.uni-trier.de/db/conf/dsn/dsn2009.html#PerdisciALL09
Hoy, J.G.: Measures for making dns more resilient against forged answers (2008), http://www.jhsoft.com/dns-xqid.html
Hubert, A., van Mook, R.: Anti dns spoofing - extended query id, xqid (2008), http://tools.ietf.org/html/draft-ietf-dnsext-forgery-resilience-10
djbdns (2004), http://cr.yp.to/djbdns.html
Dnssec, http://www.dnssec.net/
Atkins, D., Austein, R.: Threat analysis of the domain name system, dns (2004), http://www.ietf.org/rfc/rfc3833.txt
Ariyapperuma, S., Mitchell, C.J.: Security vulnerabilities in dns and dnssec. In: Proceedings of the The Second International Conference on Availability, Reliability and Security, pp. 335–342. IEEE Computer Society, Washington, DC (2007), http://portal.acm.org/citation.cfm?id=1249254.1250514
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Tzur-David, S., Lashchiver, K., Dolev, D., Anker, T. (2012). Delay Fast Packets (DFP): Prevention of DNS Cache Poisoning. In: Rajarajan, M., Piper, F., Wang, H., Kesidis, G. (eds) Security and Privacy in Communication Networks. SecureComm 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 96. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31909-9_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-31909-9_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31908-2
Online ISBN: 978-3-642-31909-9
eBook Packages: Computer ScienceComputer Science (R0)